0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:50 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:50 executing program 3: clone(0x10000007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') ptrace$cont(0x420b, r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000000c0)=@generic={0x1, 0x2, 0xfff}) 23:22:50 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[0x0]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:50 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00\x87\xec\x80\xa4\xb5.\x17\'\x8c\x97\xcd]K\xd01@\xea\x82\xb4x\xe9\xceNC\xe4\xd6\xf1\x89\x8bIY\xbbE\xaf\xb9\x8a\x12e\x1c\xc7;\x00\xb2\xfc\xff\x03\xfb\x19\xb7\xf3\xf1\xf333\xed\x05#4\x98\xfc>_\x98\x7f\x86%\xf7\x8e\x8a\x13@\xd7\xd3#\x98\xec>\xae\x1e];\x10\xea\x93\xff\xb0\xfe\xd1\xcfU\xce\x17\xbb\xc7\x92h\x1cb\r}r\x03\f\xbe\x10Nzj\x15l\xe3\x17\xab\x8b\x8fnX\xb1DT\xa9\xf7\xfd\x17{R2P\xa55\x94R\x92;y\x8e\xe8', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000001c0)='./control\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000180)='./file0\x00', 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001600)={&(0x7f00000016c0)=ANY=[@ANYBLOB="88010000434739b62963ac774068706d6fbbdac8464b247770a621f3d6c89405cec357dd20e0b6da61e07cabd8580060d17ea6ddd8b2d1c5cd58412e0f53747cef322c29de01000000d66841966756d58d1681151634f7fad8e3b5d7043e1fbbd838f4beb895c49a2cddd740a2af2a7e14cbe6dac2abfbb12b0000c6b80edc2b6fc82dfcb1149827317a12765ad4f0d47f8a7cee29974e0ed093a87eb9365f9adb2cc4de4f30d86cd58f1561027607c074f6c936f0b3c3ee7272e81d858ec56f5187d436770cfcf6000000", @ANYRES16=r4, @ANYBLOB="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"], 0x188}, 0x1, 0x0, 0x0, 0x4008000}, 0x10) sendto$packet(r3, &(0x7f0000001380)="3643cf0a8dbaabfbf8a3b494a7ca26efd411db", 0x13, 0x40, 0x0, 0x0) rmdir(&(0x7f0000000080)='./control\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) readlink(&(0x7f0000000040)='./control\x00', &(0x7f0000000300)=""/61, 0x3d) llistxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/4096, 0x1000) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x8, {0x2, 0x0, @multicast2}, 'ipddp0\x00'}) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000001680), 0x4) unlinkat(r3, &(0x7f00000013c0)='./file0\x00', 0x0) [ 1847.639303] audit: type=1400 audit(1552605770.495:320): avc: denied { ioctl } for pid=14449 comm="syz-executor.3" path="socket:[263175]" dev="sockfs" ino=263175 ioctlcmd=0x8941 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:22:50 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00\x87\xec\x80\xa4\xb5.\x17\'\x8c\x97\xcd]K\xd01@\xea\x82\xb4x\xe9\xceNC\xe4\xd6\xf1\x89\x8bIY\xbbE\xaf\xb9\x8a\x12e\x1c\xc7;\x00\xb2\xfc\xff\x03\xfb\x19\xb7\xf3\xf1\xf333\xed\x05#4\x98\xfc>_\x98\x7f\x86%\xf7\x8e\x8a\x13@\xd7\xd3#\x98\xec>\xae\x1e];\x10\xea\x93\xff\xb0\xfe\xd1\xcfU\xce\x17\xbb\xc7\x92h\x1cb\r}r\x03\f\xbe\x10Nzj\x15l\xe3\x17\xab\x8b\x8fnX\xb1DT\xa9\xf7\xfd\x17{R2P\xa55\x94R\x92;y\x8e\xe8', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f00000001c0)='./control\x00', 0x0, 0x0) unlinkat(r3, &(0x7f0000000180)='./file0\x00', 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001400)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000001640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001600)={&(0x7f00000016c0)=ANY=[@ANYBLOB="88010000434739b62963ac774068706d6fbbdac8464b247770a621f3d6c89405cec357dd20e0b6da61e07cabd8580060d17ea6ddd8b2d1c5cd58412e0f53747cef322c29de01000000d66841966756d58d1681151634f7fad8e3b5d7043e1fbbd838f4beb895c49a2cddd740a2af2a7e14cbe6dac2abfbb12b0000c6b80edc2b6fc82dfcb1149827317a12765ad4f0d47f8a7cee29974e0ed093a87eb9365f9adb2cc4de4f30d86cd58f1561027607c074f6c936f0b3c3ee7272e81d858ec56f5187d436770cfcf6000000", @ANYRES16=r4, @ANYBLOB="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"], 0x188}, 0x1, 0x0, 0x0, 0x4008000}, 0x10) sendto$packet(r3, &(0x7f0000001380)="3643cf0a8dbaabfbf8a3b494a7ca26efd411db", 0x13, 0x40, 0x0, 0x0) rmdir(&(0x7f0000000080)='./control\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) readlink(&(0x7f0000000040)='./control\x00', &(0x7f0000000300)=""/61, 0x3d) llistxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/4096, 0x1000) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000100)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x8, {0x2, 0x0, @multicast2}, 'ipddp0\x00'}) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000001680), 0x4) unlinkat(r3, &(0x7f00000013c0)='./file0\x00', 0x0) 23:22:50 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) mknod(&(0x7f0000000680)='./file0\x00', 0x8108, 0x8001) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0), 0x0, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r4, 0xfffffffffffffe00, 0x1ff}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'sha384-avx\x00'}}, &(0x7f0000000340)="d3a55ba3c38acd5122b868237e7da4786dfb67ee7b8c00da8be932b19a85db89efa44737dc96a2136104c6470f002a3c58d3cfeba1542fd356bb7b0a01f3532acbdaec2e18f61479b0263843569a329479b6d962c355700fa6988a04417bb415cd571639712621f81f8b948d30186ffd44a831a9a721eea1a6868ac796ad7d4ac01e99170b030d", &(0x7f0000000480)=""/144) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0xb4, r7, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7937b984}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8000}, 0x20000800) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:51 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:51 executing program 3: r0 = socket(0x80000000000000a, 0x10000000002, 0x0) socketpair$unix(0x1, 0x20000, 0x0, &(0x7f0000000200)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) 23:22:51 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r5, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[0x0]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:52 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) write$P9_RATTACH(r3, &(0x7f00000002c0)={0xfffffffffffffe5c, 0x69, 0x2, {0x48, 0x8004, 0x5}}, 0x14) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:52 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000100)={{}, {0x77359400}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0x1, 0x1}, 0x7}}, 0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) 23:22:52 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, 0x0, 0x0, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:52 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000088c0)=[{{&(0x7f00000009c0)=@sco, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000003500)=[{&(0x7f00000058c0)=""/4096, 0x1000}], 0x1, &(0x7f0000003580)=""/109, 0x6d}}], 0x2, 0x0, 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x109002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000140)=0x3) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f0000000180)=[{0x0, 0x400, 0xab16, 0x8}, {0x700, 0x1, 0x5, 0x40}, {0xfffffffffffff800, 0x2a89e967, 0xffffffffffff0001, 0x9}]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x50}, {0x6, 0x0, 0x0, 0x1}]}, 0x10) sendmmsg(r2, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000001c0)=0x3) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x100, 0xa, 0x1e, 0x4, "1cadd6c28bc7276499e89b61ef18585d305b1704622d9c69782c5334aae9b0999b16c4ab5dbe9b440c0913e22e38f0cc4a6a848494c8de15c542b770c5740df4", "7c593a3ef70bc5a25d08a994b3a4b10e17388fd9cbcbf60f3529c52e34d5622f", [0x7ff, 0x9]}) 23:22:52 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[0x0]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getpeername(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000140)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getqdisc={0x34, 0x26, 0x326, 0x70bd28, 0x25dfdbff, {0x0, r1, {0xffff, 0xfffb}, {0xffe0, 0xfff7}, {0xffff, 0xffec}}, [{0x4}, {0x4}, {0x4}, {0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r2 = getgid() setfsgid(r2) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/dev'], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) pipe(&(0x7f0000000080)) 23:22:52 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000180)='\\', 0x1, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 23:22:52 executing program 3: clone(0x8000000000041fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x204080, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200208}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x200, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0xc8}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4845) ptrace(0x8, r0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x4e22, @empty}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x102, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)='vlan0\x00', 0x0, 0xb1, 0x2}) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000340)={0x800, 0x3, 0x8, 0x3ff, 0x400, 0xfa}) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000140)) 23:22:52 executing program 0: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000180)='\\', 0x1, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 23:22:52 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) close(0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) getsockname(r1, &(0x7f0000000280)=@ipx, &(0x7f0000000040)=0x80) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bind(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @local}, 0x0, 0x0, 0x1}}, 0x80) sendto$inet(r1, &(0x7f0000000340)="206305edd00e5af621f142dbd62e7f2ea21e48c0be80fedb5a38eb8019e294a82910f72aba408eae12780f7da3a210c7d63a5f57c8c68d963f33b214cf9b9ee7afe2e54c2f761bd096ccdca5b1576f58261991c86acb7037bc30f28bc70aa6e9b012a2340ecd63da8fbe9564b37355d54cc6819be9262afbf1dd2b61dd2f4ebcb750137f5b3eb5ab72393af8d0908867874049b896f3fd352af32f004846342c47a0a5228faf0f8bd16d85654995a6ce054063f2ab82e6e9c140cf24fa18e5d08a67f2fd4fcccfe298cbfd153004cea2030fede44324f739202c2454ca2d8521be4cbe2daa2f7d13b3da3e235ce13a204d3a7e108e7aef1a937bbd2f15c347da13a5229327bdce3a7da375bd5341495768ba4dc3c160d1158d456a890bbf044a054ebae3ca4759fd2112a6b059c5a01c8aee3464306280ad6e375ea62a1cdf1bb672f96b280ff579f7d0acf072d613f13066b9c7d5f0b54dc983e180d5d08b2030160d6b50934bf47ff2be67b2a5530d0a6cccb280afae865867b7e6f4422466ff9fc051a07eff8a3880e432d3a643689f3de4bc7f6fc64941bda01609b58f6e694d37af7fd69662ae36923bd482de6693c97e23a319ed201b9697a67487dbbbdf83ba72b439eae7efc34c1a3d9a56d64b1584f0f7ff57167c0f86d8c78a0e1e431a938b1592064cb3054ad4b298d88953388fbfdb4c0abde466659bda384e17dbabffc2aa7be2ed64b901be8f8ee5fb5ec323fe3b5085ac21a33f6213d62ff1ad2bd0b3e3f1a16a8d64bb800b02301d6d414cd25b4d6ea8cbf7ea65e3a854bafe4189bba3321834180f0194eb1c81b17014f35e056200cf7d26678739b1623454365389d52fe7d63e0b5fb8af55ff2d3f78d6cbec4e6ea62c6a73d749474d7d1e029686f20f5dc1ff67e55a890409fba15ff689172d153ebeeb94b4ce728df34a858914339b3f5c161e63526e790eb588fb15a17af00e5293a1c15a457b6b8e7935fd8df006f37cdfb0fb4b19c95d2782611ea398de34dbc51b25294a8b570e275e94df2eadabca4fb608576850f2965e8dd22a7e12c83140e305931ae6c41f2af95a1f6febd8dc2b6accaf30800653573f9eab449065a32d34defcd6755f706351c172cb0b321e771eb96f67e17932009a0f13d8da2ac197b1b886ad9023ee6a2b6ff601d96021820a1a47471ec9a2f57d511735924dacafd63f175833f7955692a81a1cd39d7e73f2e3bac98308caeea2f915e9a745741ca8956b78b4a0047bf95ca113454c8fb8d21acc9cea63d76b5367c7e873bdccf85d0e0f776820bf6e9bca1e980da60c0f6adc078ae163bd59044c5f04e8e809e0f79f3922f9993ecc95666634c6e48d45520974ff998976fb45e87e3d9f8d4ce49797ef8d3e2f5dc742b2be2298696d5ca94df9cf8ef4f74c0b1b144ef4f7ec88f0cd120cf7be5ce3963c520014757767d31fda15f94d58e8a91cfe395c0bf372c21140360b3ce6d611b152e42e7854677a4f1b962d4caa85e742b8722321ae2efef681fa75ffbc4c942525a6de27dec6e1856b1f861a7727f9eb4b430c964587e7a5f47f9535a44df53ffb92187fb166b195cea53d2f56597991e36aa17fbe22b255f791f874b5f6be55dc068a11d2d9d729a06da8d20d46c8ccb8ee81ee1787a238fd75f1a46119f40e0af901a8d6dbfaf2fa2cf91990d461f9cf8198dc243276f215b8ec15b7f3ad8d218fecbf261440b04e8e2127d8b6a26053b4a36c11f8b82952bb4c16a77892cbdb8e9b608cb4c9f120f49639d1bcbeccc9eb37d62859f15d1c6b5d813f7cd61f4eaf8d510d0beb433b8b1aad4657f937b6420f670918292d65568188c68ee5360c052cd9eba36e0d2a099433be47f5b54a31190a3d708ca499a7ed3c740919c670661ded716536555fd1ed0b5e491fbea4376e1067c2cc75a052e4a5447082195a361be8c1b05396d67586e88de4eca0848cf8bbade544ad6b4405ad92a71aec5cee9cc0f7dddb22bcd80a2b755006d22db6314ca884925ed73191973c39b5bece914fa27021a2ea7f1c3e939adf6a0b449d46ad58ac1a114a2d248e6f237d7b16a31e174f171631bc98c1b70359edc377c9d460dbcfa9ac28022f26a3d213447498003324e41385c63d1e2481fadf59b44e4b6759eac2d969881456a86c87dd64d69243e59335f8e8fdce1bdb43c835243798963205aa25663525597adbbe5f6b7c279dac5b219e2cfee0f8830c766473ac9279bd823b5e9a6939f1fb01f9b4d7e39a8766e7", 0x649, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f00000009c0)=0xc) setsockopt$inet_tcp_int(r1, 0x6, 0x33, &(0x7f0000000fc0)=0x9, 0x4) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000f80)=0x4) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) faccessat(r4, &(0x7f0000000b00)='./file0\x00', 0x11, 0x0) chown(&(0x7f0000000140)='./file0\x00', r2, r3) getsockname$packet(r4, &(0x7f0000000b80)={0x11, 0x0, 0x0}, &(0x7f0000000bc0)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000d00)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c00)=@newtfilter={0x5c, 0x2c, 0x700, 0x0, 0x25dfdbfc, {0x0, r5, {0xffe5, 0xf}, {0xd}, {0xfffd, 0xfff7}}, [@TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x8, 0x5, {0xfffffffffffffffb}}, @TCA_CHAIN={0x8, 0xb, 0x7}, @TCA_RATE={0x8, 0x5, {0x4, 0x5}}, @TCA_RATE={0x8, 0x5, {0xffffffffffffff81, 0x7}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x8, 0x5, {0x9, 0x8}}]}, 0x5c}}, 0x4000) accept4(r0, &(0x7f0000000e40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000c80)=0x80, 0x80000) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000d40)={@in6={{0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x28}, 0x6aaa}}, 0x0, 0x7, 0x0, "8972c75ba830d1de07d3af8d906ef24cbdd94f509433af15673d0e6b9a659977fb09a5bd0274d77b21f395001ee86d345bbdba53a7dbccf8bb629d68d3c6f968010cc6f72c8a7d4c60ded57bb496a643"}, 0xd8) [ 1849.788446] audit: type=1400 audit(1552605772.645:321): avc: denied { bind } for pid=14576 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1849.883479] audit: type=1400 audit(1552605772.735:322): avc: denied { accept } for pid=14576 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:22:53 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, 0x0, 0x0, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:53 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, 0x0, 0x0, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:53 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:53 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, r4) eventfd(0x0) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xf, &(0x7f0000000280)=""/46, &(0x7f00000002c0)=0x2e) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) fsetxattr$security_evm(r6, &(0x7f0000000080)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02490c"], 0xe, 0x1) ioctl$TUNSETFILTEREBPF(r6, 0x800454e1, &(0x7f0000000300)=r0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$TIOCNOTTY(r2, 0x5422) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:53 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) prlimit64(r1, 0x9, &(0x7f00000000c0)={0x20}, 0x0) mprotect(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x2) 23:22:53 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:53 executing program 0: mmap(&(0x7f0000046000/0x2000)=nil, 0x2000, 0x0, 0x40000000000031, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x9, 0x3, 0x3c0, 0x1c0, 0x0, 0x0, 0x0, 0x0, 0x328, 0x328, 0x328, 0x328, 0x328, 0x3, &(0x7f00000000c0), {[{{@ip={@multicast1, @empty, 0xffffff00, 0x0, 'syz_tun\x00', 'syzkaller0\x00', {0xff}, {0xff}, 0x0, 0x2, 0x10}, 0x0, 0x98, 0x1c0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x9, 'system_u:object_r:dmesg_exec_t:s0\x00'}}}, {{@uncond, 0x0, 0x128, 0x168, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x3, [0x4, 0x100000001, 0x400, 0x3ff, 0x4, 0x488b], 0x20, 0x8000}}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x4, 0xd, 0x2, 0x2}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x2c, 0x8, 0x7, 0x468, 0x7f, 0x0, 0x6, 0x1]}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x420) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080)={0xa, 0x3, 0x0, 0x9}, 0xa) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 23:22:53 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, 0x0, 0x0, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:53 executing program 0: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x7, 0x8, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_access(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a61646d696e5f7061737377645f657865635f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a733020303030303030303030303030303030333237363900eb69477f5361a7b66ccd27182ac99ad790b1fedae58b8d71ffb732af4059cb244d2b920b9f0900054c46ee9d5764cb8f2724e9446e569704aa483da39a8b6c00b16016ba0cbeffb1cf8b771527f617c3ea422341bc76afc622eb4ab5dc04caa1614ac63273ae5d8bd355bd1de3fbf62e6cf61028f90a3d"], 0x5c) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0)={0x1, 0x4, 0x80, 0x772, 0x4}, 0x14) [ 1851.172862] SELinux: Invalid class 32769 [ 1851.227620] SELinux: Invalid class 32769 23:22:54 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000004, 0x1d, r0, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) socket$inet_udp(0x2, 0x2, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x1010, r0, 0x0) 23:22:54 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:54 executing program 0: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40046607, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90x0}) r4 = syz_open_procfs(r3, &(0x7f00000002c0)='net/anycast6\x00') preadv(r4, &(0x7f0000001400), 0x35a, 0x52) 23:22:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="34008000", @ANYRES16=r2, @ANYBLOB="010028bd7000fcdbdf2502000000140004000100008001000080000000000100000008000600000000000800050005000000080006000000000004000400040004000c0004000400000007000000"], 0x54}, 0x1, 0x0, 0x0, 0x4008001}, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000200)={'nat\x00'}, &(0x7f0000000280)=0x54) read(r0, 0x0, 0x0) [ 1851.456479] audit: type=1400 audit(1552605774.315:323): avc: denied { dyntransition } for pid=14665 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 23:22:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x400) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c40)={'veth0\x00'}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="1000080007002e2f6669dc61b2308100d6bc4ce205538924882fdd7c03a71612bc60e049a4f235799066624e6fd29c63b4a95daf0f7917813bb85a6aa38926211a44"], 0x42) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x800000, 0x0) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, r2) chdir(&(0x7f0000000200)='./file0\x00') r3 = open(&(0x7f0000000240)='./file0\x00', 0x20141042, 0xfffffffffffffffc) write$UHID_INPUT(r3, &(0x7f0000000c80)={0x8, "5f5539ae7383df635d7eb9f00cde999ef4e1d4fbae589edcbcd64ae9781d89f20a7c347bd734db9d80a3e9ee0d0f04fe5305dacf9e656dc623d0d8abb05b81ebf7fa83533ebfe364612ee7d5571be6e3af5eccf0e26370ff66a26e95f4b7b1206b9d9a70fe612b356ec5074716b0e71eb9f60ac1c5e653c9a7de0de9a5f8c8047f77ece27201fc36e2ca04338864356e123b3b96be97afa5d6698e6f08a657f7ad07b42df05dfca83247581434b575e2d4419e52f1103e9e3ddc440a98f9caeace71f8affb3cfc62e4b428403787ff063d2923a50c0410f191c7923b77c51fea54cc7f2b8adcd2a5e1f53495c168736a160f28435b70f6e40df8523c2deaef8b70f13bc408d1d6eb05dbcae35f0c12cb00b8d589c0dda912acf9315852e1cbb85857f9421cd623fc5046448db22eec3c07358c4778c73a2495bf3452b18d8e904ed88ae250a99edb20b78fc923ccc841847a4f6d514320309afe2f0a075e50096c7a8cd4da2d88791d01a10cea10a97d32e8bb05a5e2bf52be5fffa3fb26953a0fadac598644cf0297d01d5c1ed9f2123ba789fa650b0d140a478903cc23a5b5c2a2a52f19bdd40039ac0291f648f1f991e272c52669f7843e73b3be22103fe0a88d5d405b9ecea5d602be0b5466d18d8a971b69a8e80e48621103a6bc6ee3a7b70b199005241779f22fa2cc159988eaf2d53c858ec06ab56acc232b587ffee3a5cb29f5641b2189fb1617d1a652e42511fe2e447a2636f18ceabc261126200193eb9f309f80aa204a93883bf6fb247ade866685f300295f8735e18d1d81365dbd2bddfa1779c59effed803bbe0a68302b1ab0f0d00892138ad24d52d653d92897bd28c2f031a77eae54ef3ce9a1fc44ea41763b2d780a454f68ea1a297302b4fa6664923a818040f5a74e0db3ff24e940e97d4abff40af2d36f7bceb8a0c5e90dbefbc8ba496f6e42f11ce11fb20655138f9387938abc3aa3a742f749a8695d972c537127519f654945bac96f0a2ef9d6b24f2226ae677684e3eb63041d6b5105777a8e6aa41ff11366448c0af1ddf5e3f2a1d828b4c9ede3809eab736c9035f2a7032ce38b699dfdc3e158e1ce62d325441e1b05a3ba5f663f20b0cb703cb2960aad298177881aa6b52bf4ae112c5d2bb691ac34b0723be7ddcfff0015e578475db1f062c5a50b54bbcba2f591eb4d6de66f386b0d5dd3975229ad25ae95d82266dfb9c1a6f497ef54b6ac5ee81edae16c47e89f9a435377dfac411db459559ce483921251745b8b94f69d4815b009ea86aedc5a75a516ff2afaff9a418f73c2cacbcdf45dd02ba962399f9b81e149635c2b4c0bda790a6d72fc243f6fbc73d0a0636db51c03d93b44b42c07f2269b465231f953e6a45dc549e9b5ef05443da7820cd667f5b0ff47a13f0a3df630a6f98f72e09978b829389d6a11afb0a7a0988822bb95fcb50399e51295f464662118646d2996da0fa710b082036820ae0a60828479bad4489061244b74179cfec74ab273551190c0eb2ca95be86391b8e469454796d04b29646b8aaae49889ffd84e83e33fb0cd7b10d778e72422f474911897dbd4548d9658e9af23cfff0ad4a7d750ab59e0f8988082ab7ac8d27eeab1c5809de6694aba8ee6ff1ba23d422f38dc026a77933cb0fc916d22131f7f736e35c881c5551f13a5037f65b9090372bb8e73bb9cd686715afef6b40ff275a978078c1e1c7db358285e5caee5c53cb4a7b446db91e5c0615342265edd9f09a72002aae56c7ad4269a0513569db514ee852724cdcccb72e8836fc270f7aa03e03e65f4572c2909e6fb1b557e89c3b505ba2f2b10b545513758abdbdc5b3e5ec1fe4d6bd5947b354058eccb79f10e971a85bdafa5aa27224acc734d884f9282ed033fc540defa3181d451713565d940879cd70a1d704b9a390de509351d5129bff18051b0c7ca196a78d3b8d0c8f384c79ad637b2e1770fecfc980960ef403cbc6bb284792cd169133f35aea028d9ffdc1668572dd197db86a26cb6fe1bb822bb76968ef2cd3c384704b75d0f17a50bcce054a400edd3b2f2abf72d2d8a679fdc94216d2d7d43ca1e60aeb5a313f8104f8ae54e75beb6c106cf080b9ecc9a1f91508b37d9ede25a1bede738c3a7f3501391a7b1863fe120ea26c4ff13f1de4588b150f3f2c12a9b9d92e6a8610c788c4d449a91416307a313536e1779bef88028d65a9398c5d1492b729d5f08e34e64fa07507f64297a1f9305a2d68169f653d5c107c9860ca0d822916eb357c646c229e792b1a5da56b35ab971bb82e41581e11f24f9c6b26c019dd2f2f89f2a82b74bd856ed7b46a2d9c07b2856bc39e9a28f271c5bb06db5bfa04d21e37e778b3e03071d25da8bbc91543fe8909603ba92e3455cb0edfe1dc040f12c169a97a5b8fb09f97acda29ab8491e7c9f81320b1a9de5773078557a6a0bdc5a1bfd2d953c47b3e5ccc70d76dc4ba10c297d7591e2c2150b8235de09714fedcf23aedb0ec9586e52f6af6c299256ad5a0a4ce22666be48592977dc5ff5c5eea529b81df4510016240b8fc8489bf59c899bb75481220554d0b9aebf1660cb72b01dfc3ffaac27dc1d36247e86339c6d99fc3ca8edf585fdb236ecdffda1b99819f873367ee5d8fde5d596517f895c9154deab01ca26008edbeadecfe33cae750ff044469a1b3b104b35af0c04a35a48aecf54dd8844b598432b81f67ce232ad46a247cad103274cd7c206d890008b149aaa3310f9794243cc5e04d4bd3e66a5b01ef67044412eba507a20399856cd26fb6233ebc064aa7b5ba94198bc05301dd74d6875b6d3b4731c2a11f0656767a3e6ba0a3d6951a7f9385ff99876891b8150ac5257756ef92a6c3854ccba8f13bca3cd3e66fdc93feefc44c3eba570970e0a6921f1eef24713ed5a174b8e52a0bc1bd3b420bdd0e521835289d29267fca4512caeaf64d1adeba2457864801d30d37e4eea965f8cfdb314f62307d8a12084a65da330f800862cae3876cdffe8c77d982ce9527b069628f0d796c0ec1c1b423ab6eb248e176a9b201d4de572f7901d8d88ae3dc6c3f196a4e3fb81552f16f7a7b7b3a242824b0618a855fc150fe8d484c80b3e1ea6c42f165dcfa7b0b292f9c7f27179d32260d4f472385a8818f7d76133030cf1256153b4162c8c3a3629c01e9b8cb5a30b3d0068d7f0e3727d8159739386511746fad1cfcc98c7af05b489876432957c6d59c51f12ebb62acac90311e6b00cea58b355db5a36718dfb8140d23e64e41ef9d33969cae75ea3ef8f14ad8c9b2d0c8bd7bf4366b091b5992ffbd71800495c0484cbee4b5fffaede0808cdcfa2409227e6b96dd82481d6d00bfff72c29f860b7fa4fa9c3634d9a2e4f7a8ef240c997b749e0562514d5c2c5d66da75149dea37b1cbb347fa0df5be2b9a5ddf20a6d47936b3b55cedc64453e69413a89c8a9eaeda00fccc96281b4f29db0f3e45fa098c77ffe3c0488529ecfa801cdf7fe8a23f6a3aa04acaf4e300c44e6d873f43b9fd4b13cbed2411c97378e07c7a6799d272d36ac8964233130947ed88f727915fa58a4812ceacd6cc6a52bc7fcba5e57543e93d293d5a428c73b194f33ba752b0ebeb0262423e7a8f490707a220857f44e191304cffb93cfc75b217ca306292549c8742fe3aa62a464d40c666115015201c0fef3e9555615f91c3d15b6e1556a9b04febc2ae7e3d689ca5f58b51f2717ae8c5153f2c2a4df11ea8cafcc369327c2a0a6f7946daf09be323d59e4b0e42ebcdeca373a6d70a3286382f1405b7107af899da00dbd52324657870bd18ca26f3ef47e0e81cd335c827512e88f24202836e7a1b505f0d03a23d577430d971458a11ff42e36b2d2883b664d402eb7497a90ba1f94829b6d9c6b4c4f7e9dc49882520a6fd2590cb8b41328541b9076e43f6019c3da9084e57960478c268f4215bb98455fbd2981e7e37caf7aaf9008f87cfe196da930637c55da5a34e142a433494e6f92a5985d7e6fc0ec68d2ad25144919af6dc81afc88cd05f01b401730bccc3086c9dd06d38ed522e52e7ffae7671898fb91cec0821c061aaea6c47ae877d2d7f5ca1ecf159e0ea152ce713f652c116f62e12cad293331db922a5fed311ab22096d90fc17ccc53f84d46eae680def0b9949e0d9debff263d575e590941a5ce0b33548beb6dbc01104f6054da73cc349625adece6a54e092d8d740915b91d81df30374a78693d6b69724f05354d61ac0febff4a544b88954d11d3f4927895edf6ad755313227ac87f24f12d70a831df16bd45c4a03570fdf27d698fa5581fce2d002890a3f2059a6bfdf77f0aeee3ad8318449bc1b2d486b225b148a78e921c73a2c37256dfb1ad611e410d5436e0d31d00ab5177da7915a74ef3307927c23c764f5cf62c3e2db86284c9abb39045b625d507f5c8d440557b4dad2a39593fbb572cce25a364aae44134fdd97ef0148690881bee42b6bd929f12cdf07996597a2a8366b12841f8fb8dfc0ece651756637b95c6bdb92320302805b4a700e7d3dfb0b8878862f400f8437a6c153b5fab40d30af07e73cf4345cb6fa81574018a7bc0e8789fae8b8560f4b93d413fa8e0e0218527ccb82873fc9da6cc34b6197c1d8bd9223ab7c4efb1f8cf021450037f4576934d83116655c120062fc3b912176fd395ccc792d492f2730465f8b4c68155b6ceb52e80742d2970e24004171f4685cd78467a4e943a0fecff66dffff10922d69236460dc37c1df9b19dded1ecb932dd8dd2045d2f8e8d3dfb6a83a65d6623553a2aed7a12b78effeeaa58eec84cdefc84923177afb7bd04f6fc3d3332d63ed5c5d6fe8820b9853e7615407eb23962f5232db44bc0267e7f07e47b158de0732a974b80aeb00ffeeca83d26fe21e487ea4472cd9048f942155784af8f68006cdb4286480a7ffa1ba6e93fe7fdb33283359d28bf9311dee59899e0e77aa113fadda21526c8e2bd60f21e182b735a5b0177fb95e948857c6c4ae391b2b4950a35b129e7bf25b7eb2c0857290c55f5d28b78ca1f39f0cd676610805b0a378647ae958182b26de1ddbf80e80d7ab1d2476086ed192e98bee0969bc0e8765278cb5570ccc29ac6d7298821bff4f85895deffcf4ce54a69878cfb41eade0d8703cbcff02352733ace2d800ba68b0fdcc52b94247ecacddf80ad228cf76eb547d276d0f6402054e34c3569e2b53ea3cbc54e49e099372cde3acd1ba47f836a765f855763a175a58ec4d6cecc72375da2d8c956c2868e77bfdb697182b554f0b743d7095cf13a3ba1d19e7590c281bd09ce235898a9682aacb5633b4fa4c3bdd71139c20c518b6a7651a47df7658a5a7ed41b3e7e43543d68c1dd4a5d01ec7e42cabdd6963db84f0d69b5a471ff8b929a8774baee39b14ab325af2ea7756c656c0135a59568499208341333d6b896cf0cc10108970e20313df241d179bd2a4d2392b269e6aeb9d2570bba7e3c67f49e90cf95562f93077a5fb588225724d444fcd8da55921dcff7b0be49ac0171ae98209e729f65bcebe447ccc0a185719f3fd55d1ae263daac4a420da91d05cdfc85d48e5743483dbb6fe81e5c216948953d95d5e725db17df44f05a57c6cc425e55572f9163e536a6d2d51d5213c937f6ddba08fc1f90ec73088a766a685f2c0d43b80422d48eef23b2ea588ea26b8dffb4f0df0cf91d6ea8f14a663ba2b165e4427010742fe63905d62b9dcf2385dce09fe75e4746d5c9c402ee77bfc9f39a28eb9f2751a81b090a499706accafbf5ae1afa9af350fd7481bb", 0x1000}, 0x1006) sendfile(r3, r3, &(0x7f0000d83ff8), 0x2008000fffffffe) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340)=0x3, 0x4) readlinkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=""/8, 0x8) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) r4 = getpgid(0x0) ptrace(0x200000000003, r4) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x10000000102) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@local, 0xffffffffffffffff, 0x0, 0xff}, 0x20) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x0) [ 1851.563622] audit: type=1400 audit(1552605774.415:324): avc: denied { create } for pid=14665 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=netlink_generic_socket permissive=1 23:22:54 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:54 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:54 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) ioctl$BLKDISCARD(r6, 0x1277, &(0x7f0000000080)=0x3da4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:54 executing program 0: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, 0x0, 0x0, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:55 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:55 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:55 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:55 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:56 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x0, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:56 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:56 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000340)=@sha1={0x1, "364cd5d1b41ba37d59dbc207b8ed3fc3591f0c81"}, 0x15, 0x1) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50010000", @ANYRES16=r2, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x20040800}, 0x8000) r3 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r3, 0x23) 23:22:56 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:56 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f00000016c0)=@rc, &(0x7f0000001740)=0x80, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair(0xf, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2000000000003b, 0x2, 0xffffffffffffffff}, 0x2c) open$dir(&(0x7f00000000c0)='./file0\x00', 0x2, 0x1) close(r0) execveat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000200)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ', &(0x7f0000000240)='trustedppp0-&\x00'], &(0x7f0000000540)=[&(0x7f00000002c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ', &(0x7f0000000300)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ', &(0x7f0000000340)='vmnet1.cpuseteth1cpuset\x00', &(0x7f0000000380)='\x81em0\x00', &(0x7f00000003c0)='\\)(,\\nodevbdev#posix_acl_access]gppp1-+\x00', &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ', &(0x7f0000000440)='self\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='eth1\x00', &(0x7f0000000500)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 '], 0x100) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') pipe(&(0x7f0000000140)={0xffffffffffffffff}) symlinkat(&(0x7f0000000100)='./file0\x00', r3, &(0x7f0000000180)='./file0\x00') 23:22:57 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000180)=0x15e) fchmod(r4, 0x10) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f00000002c0)=""/144) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) bind$unix(r3, &(0x7f0000000380)=@abs={0x1, 0x0, 0x4e23}, 0x6e) fcntl$setstatus(r0, 0x4, 0x4000) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:57 executing program 0: io_setup(0x5, &(0x7f00000000c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'caif0\x00', 0x3202}) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0}]) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000026c0)={'netdevsim0\x00', 0x0}) r3 = socket$inet6(0xa, 0x0, 0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002700)={'veth0_to_team\x00', r2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x90) fadvise64(r1, 0x0, 0x1e1, 0x5) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000100)=0x10000, 0x4) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000140)={'veth0\x00', 0x651}) 23:22:57 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000002fdd)={0x0, 0xffffffffffffff6c, 0x0}, 0x0) 23:22:57 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:57 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:57 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:57 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r2, r3) r4 = memfd_create(&(0x7f0000000040)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$P9_RLERRORu(r4, &(0x7f00000000c0)={0xd, 0x7, 0xffffffffffffffff}, 0xd) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000000)={0x0}) 23:22:57 executing program 3: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000140)) dup2(r2, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/4\x00') preadv(r3, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0x2b7}], 0x1, 0x0) ioctl$void(r1, 0x5451) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 23:22:57 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x73, 0xff55) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040), 0x4) clone(0x20003ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x80, 0x5) r1 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) close(r1) r2 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x101, 0x105082) r3 = memfd_create(&(0x7f0000000180)='}#*nodevem2N,\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x81000) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x360) fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0x526987c9) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r2, r3, 0x0, 0x80005) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) syz_open_procfs(r6, &(0x7f0000000380)='envh&on\x00') ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000800)=@generic={0x1, 0x10001, 0x80000000}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) io_setup(0x8, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) 23:22:57 executing program 3: r0 = memfd_create(&(0x7f0000000180)='\x06\x00\x00\x00^\x00\xac\xd8\xfd\xcc\xeeq\xe5\xf5\xcb\x801`\xe48\x85\xa4\xf5\xd0\x1b\\\x04\f\xf8F\\\xb4\xba\x8d\xef\x12d\xee\xa5?\x00kZ\x8b\x19h\xd7|\x14i\r\x18U9\xc1\xd7\x10\xf0G\x12\xa8\xbaa\xb2\x94|%n\x1e+\x9f\xbb\xb8\xac\x81\x8d\x93q\xd4\xd4z\xaaZ\x0f\xaa\xc7\x97#\xe5g l\xd55\x15\xbf\xfc\xf5\x83\xb72\x00Y\x15\x92\xb1\xb6a\xf4\xe9u\xb2\xe7\xeciy\b\xdb\xc7\xf1\x87\xc9\a\x91\x04J\xc8\x0e\xff|J\'Nxr\x00\xbc\xab5\x9b\x85>\x99\xcaz2\xabKI\xdc\xe4\x9f\xa5\xd0\x0ewm\xe7\xccK\xc9\x8b\x8bE\x89\x03\x00\x00\x00}@Ry\xa69^\xdc\x9d\xa0\x04\xdf \aelO7\xf1\xda\xcc\xa2x\xc2\x9a\xf5\x18F\xa0\x80M\xf9,+\xc9\xf7/nt\x9ba\x14\x1b\x18\xdd\x18X\xd2o\x15\x97L\xe6\xb5\xba\xc7\xf2W\n\x7f\x14ZIL:T\x1bd\x19\x8dE\x9c\xb1\xb9JK\x1do\x85\xe9\xa2\xca\x9cd\b\xc8\xbdiQ_L\xb0\xb9 \xf7/F\xfc\'M#,\x84M\xba\xa9\xa2yr\'?f\tb\xdai\xfd\x8c\x9aoj\x84\x03i\x8a|\xf7T;=p\xa2\x98f\xc7\xefu=\x96\xcb\x11\x91\xce\xce\xbev\xaa\xbb\xca\xfa\xa3\xde\xd5\x1f\xd7\x03:12\xf2\xfd\rN\x84=A\xae\x9b3\x81\xa9~\xb7\x80\xd1\xe2\xf6\xf2\xb8\xc9\x8a\xabC\xe2\xec\xb8,j\xe1\xbb\x1b\x1f@', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000, 0x25) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14, 0x80800) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@mpls_getnetconf={0x34, 0x52, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x20}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x80}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}, @NETCONFA_IFINDEX={0x8, 0x1, r2}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000000c0)={{}, {}, [], {}, [], {0x8}}, 0x24, 0x0) 23:22:57 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:58 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) request_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000001480)='\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000014c0)='keyring\x00', &(0x7f0000001500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r4 = request_key(&(0x7f0000001540)='dns_resolver\x00', &(0x7f0000001580)={'syz', 0x0}, &(0x7f00000015c0)='vboxnet0\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000001600)='keyring\x00', 0x0, 0x0, 0x0, r4) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) ioprio_set$uid(0x3, r6, 0xdf7) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r8, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) read(r8, &(0x7f0000000480)=""/4096, 0x1000) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r9, 0x5, 0x18}, 0xc) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) flock(r5, 0x2) 23:22:58 executing program 3: capset(&(0x7f0000000100)={0x19980330}, &(0x7f00000001c0)) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4000) getsockname(r0, &(0x7f0000000040)=@xdp, &(0x7f00000000c0)=0x80) pivot_root(0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000200)="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", 0x1000) 23:22:58 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r1, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:58 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:58 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:58 executing program 0: socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @broadcast}, @in=@remote}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) geteuid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2800000010005fba000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008003d0000000000"], 0x28}}, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x41c0, 0x0) write$nbd(r2, &(0x7f0000000700)=ANY=[@ANYBLOB="67446698000000000400000003000000ae8527cd25621ea14bfc3b574ecb89f0752384c8251b4c025eb741e7e20e0376bf18402f8e332797015792b764c39fd441084f1cee2312dc27ea3fe4487fb013c368d31e3fa33303fde2ecf3cf6a8f4037c0f6798db7d0304ba66ac5970c516ea0d8b9b6de8b09d48da0a2d134654ad58a7c318e4af1a64ff21d8f29a69fe9e2ee6df4a541e8ce3b99dffc4edba2653534d08b06b4e1a3966e9e99c801cb5fbb80b5d36b68bda8c9caf59e5f57b2989c69ddd8d7539891b1a941470ec549de6cdbb34127c172cceb"], 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'syzkaller1\x00', 0x200}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x1) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000005c0)=0x2, 0x4) ioctl$TUNSETOWNER(r2, 0x400454cc, 0x0) ftruncate(r5, 0x2007fff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r1, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000003c0)="3bcd04061bf98a", 0x7}], 0x1}, 0x7}], 0x1, 0x20000004) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') write(r7, &(0x7f0000000140), 0x1000002ae) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 23:22:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41df400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x27) getpid() r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x5, r1, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast2, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) stat(0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000780)) inotify_init1(0x800) fsetxattr$system_posix_acl(r2, &(0x7f0000000240)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="cd80c20000b0b06969ef69dc00d98adcd0d01192000880410fd1b02db5d90000007cc481c653fb0fcdc4e3a95fd965eabe3c3b4d4d408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c161fc4d960404767810") 23:22:58 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r1, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:58 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(0xffffffffffffffff, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:59 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:59 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r1, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:22:59 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000000140)=""/90, 0x5a}, {&(0x7f00000004c0)=""/135, 0x87}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/15, 0xf}, {&(0x7f00000002c0)=""/39, 0x27}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/199, 0xc7}, {&(0x7f0000002680)=""/5, 0x5}], 0x9, &(0x7f0000002780)=""/21, 0x15}, 0x40000002) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) write$nbd(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xaa) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x32, &(0x7f0000000000)=@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@ipv4={[], [], @dev}]}, 0x18) truncate(&(0x7f0000002800)='./file0\x00', 0x5) 23:22:59 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) write$P9_RSYMLINK(r2, &(0x7f0000000300)={0x14, 0x11, 0x1, {0x0, 0x3, 0x8}}, 0x14) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000340)={0x0, 0x0, 0x1002}, 0x4) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000002c0)=0x32a8) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000180)={'raw\x00', 0x3a, "99e5194889318b1f6ffc6dc5d48510178f2745af78d4f5d94e1dc8b154373478a9d82ed73a6aacb7a8ad29312fad853364411053cc8a01ff4520"}, &(0x7f0000000240)=0x5e) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) write$P9_RUNLINKAT(r3, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:59 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(0xffffffffffffffff, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:22:59 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) 23:22:59 executing program 0: unshare(0x800) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x101001, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) pipe(&(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) lstat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write(r2, &(0x7f00000001c0), 0xfffffef3) r5 = epoll_create(0x4000c) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r2, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000100)=0xfffffffffffffffd) close(0xffffffffffffffff) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r0) r6 = add_key(&(0x7f0000000380)='.dead\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500)="d57c2bab712185d3629c6e14bed3ebcbeb2117dd03f02b02e0faa56b6e1cdbe05607f7a17175f58657bc0dcabe329362b98469962e43df0f972202a9e46ef4", 0x3f, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, r6, 0x5) r7 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, 0x0) sendto$packet(r7, &(0x7f00000000c0)="a0ddd49e56fb38d108fd27b107000000", 0x10, 0x20000000, 0x0, 0x0) chroot(&(0x7f0000000040)='./bus\x00') r9 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r9, 0x5, &(0x7f0000000340)) ftruncate(r7, 0x108200) io_setup(0x9, &(0x7f0000000180)) io_setup(0x5, 0x0) r10 = open(&(0x7f0000000000)='./bus\x00', 0x4000, 0x8) write$FUSE_DIRENTPLUS(r10, &(0x7f0000000540)={0x588, 0xffffffffffffffff, 0x5, [{{0x2, 0x3, 0x6, 0x40, 0xd1, 0x100000000, {0x4, 0x120000000000000, 0x7963, 0x6, 0x8, 0x112a, 0x0, 0x1, 0x1, 0xfffffffffffeffff, 0x2, r8, r4, 0x100, 0x4}}, {0x2, 0x2, 0xd, 0x350d521c, ',em0-ppp0self'}}, {{0x6, 0x1, 0xed6, 0x9, 0x5, 0x80000000, {0x5, 0x7fff, 0x7ff, 0xff, 0x8, 0x6, 0x80, 0x2b8, 0x0, 0x80000001, 0x401, r8, r4, 0xffffffffffff8000, 0x8}}, {0x3, 0xe70, 0x0, 0x3}}, {{0x2, 0x0, 0x7, 0x5, 0x9, 0x0, {0x5, 0x2, 0x9, 0x8, 0x1, 0xfffffffffffffff8, 0xf7, 0x55, 0x8, 0xffffffffffff0001, 0x5, r3, r4, 0x0, 0x10000}}, {0x4, 0x100000000, 0x1, 0x1, '#'}}, {{0x0, 0x0, 0x9, 0x3ff, 0x8, 0x4, {0x4, 0x1, 0x4e, 0x100, 0xeb0d, 0x4, 0x0, 0xda00, 0xe7e, 0x9, 0x4, r8, r4, 0xfffffffffffffff7, 0x6}}, {0x3, 0x31d0, 0x11, 0x6, '{eth1\x80#!{nodev&:\''}}, {{0x3, 0x0, 0x1000, 0x7d, 0x3, 0x9, {0x5, 0x632, 0xabd, 0x1f, 0xbc1, 0x4, 0x6f, 0x7, 0x8001, 0x100000001, 0x2, r3, r4, 0x9, 0x400}}, {0x3, 0x101, 0xb, 0x1000, '@nodevwlan1'}}, {{0x0, 0x2, 0x16e, 0x2, 0x6, 0xd732, {0x2, 0xffffffff, 0x240000000000000, 0x9, 0x4, 0x15a7, 0x3, 0x2, 0x3, 0x3, 0x80, r8, r4, 0x1, 0x3}}, {0x4, 0x2, 0x10, 0x1, '&vboxnet1vmnet0!'}}, {{0x4, 0x3, 0x4, 0xfffffffffffffff9, 0x9, 0x9e0d6f3, {0x5, 0x8, 0x3, 0x711a, 0x5000000000000, 0x0, 0x7c, 0x8, 0x80000000, 0x1, 0x7fff, r3, r4, 0x8, 0x7}}, {0x5, 0x4, 0x66, 0x3, '{#\\].\\eth1keyring}-*]\xf0selflo,posix_acl_access[procselinux\xe8-wlan0({%]/ppp0vboxnet0vmnet1mime_typenodev*'}}, {{0x0, 0x1, 0x29e7, 0x4, 0x4, 0x3, {0x4, 0x4, 0x8000000000, 0x100000000, 0x2, 0x10000, 0x4, 0x4, 0x400, 0x1001, 0x286a242c, r8, r4, 0x1, 0xfffffffffffffff7}}, {0x3, 0x3, 0x0, 0x7}}]}, 0x588) write$FUSE_OPEN(r10, &(0x7f0000000240)={0x20, 0x0, 0x1, {0x0, 0x4}}, 0x20) sendfile(r7, r10, 0x0, 0x8000fffffffe) sendfile(r7, r10, &(0x7f0000000080), 0xffffffff) 23:23:00 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, 0x0, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:00 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x8) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x8, 0x4) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYRES64], 0x8) fadvise64(r2, 0x0, 0x0, 0x4) sendfile(r2, r2, 0x0, 0x8000) 23:23:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) setsockopt$packet_int(r0, 0x107, 0xc, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'ipddp0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000140)={r2}) prctl$PR_GET_FPEMU(0x9, &(0x7f00000000c0)) 23:23:00 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(0xffffffffffffffff, 0x10) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:00 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'batadv0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2000000000023) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x12}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:23:00 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) 23:23:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xbb66, 0x400000) fallocate(r0, 0x0, 0x7, 0x100) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000240)=""/11) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000080)=""/103) r3 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$inet6(r3, &(0x7f0000000100)=""/148, 0x94, 0x10000, &(0x7f00000001c0)={0xa, 0x4e20, 0x1, @loopback, 0x7}, 0x1c) ftruncate(r1, 0x6) 23:23:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) 23:23:01 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f0000000080)=[{0x2, 0x2, 0x1f, 0x3}, {0x9, 0x6, 0x2}]}, 0x10) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) ioctl$KIOCSOUND(r6, 0x4b2f, 0x7ff) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:01 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x0) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:01 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)) 23:23:01 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, 0x0) 23:23:02 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x0) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)) 23:23:02 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, &(0x7f00000002c0)=""/71, 0x47}, 0x3}, {{&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/58, 0x3a}], 0x1, &(0x7f0000000400)=""/38, 0x26}, 0x4}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)=""/222, 0xde}, {&(0x7f0000000540)=""/33, 0x21}, {&(0x7f0000000580)=""/228, 0xe4}], 0x3, &(0x7f00000006c0)=""/4096, 0x1000}}], 0x3, 0x12040, &(0x7f0000001780)) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000017c0)='gretap0\x00') r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc), 0x4) sendfile(r1, r2, 0x0, 0x88001) sendmmsg(r1, &(0x7f0000005780), 0x4000000000000d2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000001800)={'mangle\x00'}, &(0x7f0000001880)=0x54) 23:23:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)) 23:23:03 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x0) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:03 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f0000000480)="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", 0x105) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000080)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:dhcpc_state_t:s0\x00', 0x23, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) r4 = dup3(r1, r0, 0x80000) write$selinux_access(r4, &(0x7f0000000240)={'system_u:object_r:system_map_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x400}, 0x4e) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000180)={'nat\x00'}, &(0x7f0000000200)=0x78) setpgid(r3, r2) 23:23:03 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x200000000400200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r1) r4 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$inet6_int(r4, 0x29, 0x31, &(0x7f0000dbb000), &(0x7f0000329000)=0x4) 23:23:03 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, &(0x7f00000002c0)=""/71, 0x47}, 0x3}, {{&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/58, 0x3a}], 0x1, &(0x7f0000000400)=""/38, 0x26}, 0x4}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)=""/222, 0xde}, {&(0x7f0000000540)=""/33, 0x21}, {&(0x7f0000000580)=""/228, 0xe4}], 0x3, &(0x7f00000006c0)=""/4096, 0x1000}}], 0x3, 0x12040, &(0x7f0000001780)) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000017c0)='gretap0\x00') r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc), 0x4) sendfile(r1, r2, 0x0, 0x88001) sendmmsg(r1, &(0x7f0000005780), 0x4000000000000d2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000001800)={'mangle\x00'}, &(0x7f0000001880)=0x54) 23:23:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x2259, &(0x7f0000000040)}, 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000100)=0x1e) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x6}) 23:23:04 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) r2 = request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='eth1md5sum\x00', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r2) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0xffffffffffffffcd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r3, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r0, r3, 0x0, 0x8000fffffffe) connect$unix(r1, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 23:23:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000008, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x7, 0x0, 0x0, 0x4f}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r0 = socket$unix(0x1, 0x2, 0x0) listen(r0, 0x80000000) getpeername$unix(r0, &(0x7f0000000200), &(0x7f0000000180)=0x6e) pipe(&(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000040)="252a34129022c26a6edf4b8333dee6f85bd9e6", &(0x7f0000000080)=""/211}, 0x18) 23:23:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10004040}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4000800) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000000140)=[{0x1d, 0x0, 0x4000000000401}, {0x53ef}, {0x6, 0x1}]}, 0x10) sendmmsg(r1, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) 23:23:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x11}]}, 0x30}}, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x14002, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f00000000c0)={0x1, 0x6, 0x9110}, 0xc) 23:23:04 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000400)=@generic={0x0, 0x4}) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:04 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) r0 = memfd_create(&(0x7f0000000280)='cgroup\x00', 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) r4 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000300)=""/205) set_thread_area(&(0x7f0000000180)={0x9, 0x100000, 0x0, 0x9, 0x8, 0x500, 0x8, 0x1, 0x9, 0x2}) symlinkat(&(0x7f00000001c0)='./file0\x00', r3, &(0x7f0000000200)='./file0\x00') r5 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x8a00, 0x0) r6 = syz_open_procfs(r1, &(0x7f00000005c0)='net\x00') ioctl$FICLONERANGE(r6, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x442d75e2, 0x6, 0x9}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_flowlabel\x00') preadv(r7, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000040)=0x9) 23:23:04 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="2d7fef5191f1205fea2f1ef97d2b8b5e3008cb8255a7d2427437ac827aed9645288eb0b8444add7890717e05ebce9e7aa3e7045030290775cdf27959e6d5c856e2c0069a4de82b7af8d77a316e84ea8b564df33ce1ac01450e87fb453e169166742e5f2c7c17ac497076cd087b8c1891728ca8e3bc4a2b366674640a7beb40b797ecc79980658519e869de48091676caac89e3e83f9c7e6d30b2ecb47ce56e750126324abc19732df980dcb10e79c91f45861fc442fc6e886ea273a35d5d83ed549f2e2fd350cf3ffa2cc5d9989eb33ae56c7cd2deaf7c07c0506a45741006", 0xdf, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 23:23:04 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) fchdir(r0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) fcntl$setlease(r0, 0x400, 0x0) fcntl$setpipe(r1, 0x407, 0x200) 23:23:04 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:04 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:04 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) 23:23:04 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:04 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:04 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score\x00') exit(0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0xfffffffffffffffd) sendfile(r0, r1, 0x0, 0x40000007ffffffc) 23:23:04 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:05 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:05 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000001c0)='./cgroup.cpu\x00', 0xd, 0x2) 23:23:05 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:05 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) r6 = pkey_alloc(0x0, 0x0) pkey_free(r6) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:05 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:05 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:05 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r3 = add_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="5efdbc61117440adc53a0f7ced4739a612757b744c461102c6941060e0842e241e323d4fe99c0dc7bfe5ceebaca29c16a89c5cf5e1220cc84534d5bc634c02d1cbe7bc984ef8c2405e8da977459967a04a9fa24521c33f8f5325038576dbe9e5e91eb843a1414b5a3d1372125feff6bceea9c2d5d1a74332f7f460431ba8f942836cc5584f5c926970d8e5d8708edd3d1fc6ce021fadc9052e34a9f461da08666eff815e86dac4b502ca2b0c8dc8", 0xae, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000002c0)='id_legacy\x00', &(0x7f0000000300)='\x00') r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x200000, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000380)='syz1\x00') io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) fstatfs(r4, &(0x7f0000000740)=""/4096) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:05 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pause() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score\x00') exit(0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0xfffffffffffffffd) sendfile(r0, r1, 0x0, 0x40000007ffffffc) 23:23:05 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:06 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:06 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:06 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:06 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:06 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="2d7fef5191f1205fea2f1ef97d2b8b5e3008cb8255a7d2427437ac827aed9645288eb0b8444add7890717e05ebce9e7aa3e7045030290775cdf27959e6d5c856e2c0069a4de82b7af8d77a316e84ea8b564df33ce1ac01450e87fb453e169166742e5f2c7c17ac497076cd087b8c1891728ca8e3bc4a2b366674640a7beb40b797ecc79980658519e869de48091676caac89e3e83f9c7e6d30b2ecb47ce56e750126324abc19732df980dcb10e79c91f45861fc442fc6e886ea273a35d5d83ed549f2e2fd350cf3ffa2cc5d9989eb33ae56c7cd2deaf7c07c0506a45741006", 0xdf, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 23:23:06 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000240)=[{&(0x7f0000000480)="15e29cfdb03c33327479a805cb7c30ed3ef7b384ad9117ffc0443c9e9af533d30769751ff753ca5f5c5a3c5f2709d276d279f319e784f26e7195bc87545a2fd349ff0ad03c1a14cc2dec30edbf56525a1076dd8f6ddde471a5c37d322a9d0410cdf7b922d0ded922cf01c15f7ab87e74e38cd802856b5f1753c8b311cbafdab4db43caf5a9902acc8bc222d276", 0x8d}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000001c0)={0x2b, @empty, 0x4e24, 0x1, 'wlc\x00', 0x4, 0x8, 0x21}, 0x2c) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000000)='cifs.idmap\x00', 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r6 = socket$inet6(0xa, 0x5, 0x5) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) setitimer(0x1, &(0x7f00000003c0)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000640)=0xe8) fchmod(r5, 0x10) write$P9_ROPEN(r3, &(0x7f0000000180)={0x18, 0x71, 0x1, {{0x88, 0x1}, 0x7}}, 0x18) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:06 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="2d7fef5191f1205fea2f1ef97d2b8b5e3008cb8255a7d2427437ac827aed9645288eb0b8444add7890717e05ebce9e7aa3e7045030290775cdf27959e6d5c856e2c0069a4de82b7af8d77a316e84ea8b564df33ce1ac01450e87fb453e169166742e5f2c7c17ac497076cd087b8c1891728ca8e3bc4a2b366674640a7beb40b797ecc79980658519e869de48091676caac89e3e83f9c7e6d30b2ecb47ce56e750126324abc19732df980dcb10e79c91f45861fc442fc6e886ea273a35d5d83ed549f2e2fd350cf3ffa2cc5d9989eb33ae56c7cd2deaf7c07c0506a45741006", 0xdf, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 23:23:06 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:06 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={@rand_addr="f37e8b5570d5b3e021c7d22a9d327f65", 0x62, r3}) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000300)=""/120) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:06 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:07 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:07 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:07 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:07 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:07 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) open(0x0, 0x200000, 0x44) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:07 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:08 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RLOPEN(r3, &(0x7f0000000180)={0x18, 0xd, 0x1, {{0xa4, 0x0, 0x5}, 0x10000}}, 0x18) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0xfffffffffffffffd, 0x0, 0x8000}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1002}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000080)={'nr0\x00', {0x2, 0x4e20, @local}}) 23:23:08 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000240)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="2d7fef5191f1205fea2f1ef97d2b8b5e3008cb8255a7d2427437ac827aed9645288eb0b8444add7890717e05ebce9e7aa3e7045030290775cdf27959e6d5c856e2c0069a4de82b7af8d77a316e84ea8b564df33ce1ac01450e87fb453e169166742e5f2c7c17ac497076cd087b8c1891728ca8e3bc4a2b366674640a7beb40b797ecc79980658519e869de48091676caac89e3e83f9c7e6d30b2ecb47ce56e750126324abc19732df980dcb10e79c91f45861fc442fc6e886ea273a35d5d83ed549f2e2fd350cf3ffa2cc5d9989eb33ae56c7cd2deaf7c07c0506a45741006", 0xdf, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) 23:23:08 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:08 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:08 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) syz_open_pts(r2, 0x42) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') fcntl$setstatus(r3, 0x4, 0x4800) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:08 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:08 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:08 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:09 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:09 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:09 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, 0x0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:09 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:10 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:10 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:10 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:10 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, 0x0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:10 executing program 5: r0 = socket(0x3, 0x5, 0x7ff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getresuid(&(0x7f0000000240), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) getgroups(0x1, &(0x7f0000000580)=[0xffffffffffffffff]) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r5, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) getresgid(&(0x7f0000000940)=0x0, &(0x7f0000000980), &(0x7f00000009c0)) r17 = getgid() getgroups(0x4, &(0x7f0000000a00)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00]) fsetxattr$system_posix_acl(r2, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000a40)={{}, {0x1, 0x5}, [{0x2, 0x5, r7}, {0x2, 0x2, r8}, {0x2, 0x0, r9}], {0x4, 0x1}, [{0x8, 0x5, r10}, {0x8, 0x7, r11}, {0x8, 0x1, r12}, {0x8, 0x2, r13}, {0x8, 0x0, r14}, {0x8, 0x7, r15}, {0x8, 0x3, r16}, {0x8, 0x4, r17}, {0x8, 0x1, r18}], {0x10, 0x4}, {0x20, 0x3}}, 0x84, 0x2) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:10 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) open(0x0, 0x200000, 0x44) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:10 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r2 = open(0x0, 0x200000, 0x44) ioctl$KDMKTONE(r0, 0x4b30, 0x8000000000000000) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:10 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:10 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) r6 = pkey_alloc(0x0, 0x0) pkey_free(r6) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:10 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:10 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$assume_authority(0x10, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:10 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:10 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:10 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, 0x0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:11 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:11 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x24) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r0, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) chdir(&(0x7f0000000080)='./bus\x00') io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x800, r2}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:11 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000080)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) exit_group(0xdaa) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e23, 0x80, @rand_addr="19e632b83edcb7955ff4bd26949c07c5", 0x6}, 0x1c) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000001c0)='./cgroup.cpu\x00', 0xd, 0x2) 23:23:11 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:11 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:11 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:11 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:11 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}, 0x84000) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000040)=0xffff) 23:23:11 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) ioctl$FS_IOC_SETVERSION(r3, 0x40087602, &(0x7f0000000080)=0xffffffff) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:12 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:12 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000002d80)=""/175, &(0x7f0000000140)=0xd7) 23:23:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x80008) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x2000, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:12 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:12 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:12 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="73797a314d8b094e5d84edfaff93d8d67faaac97e238be0efd37a603c4af2c20e158006e3eec291ba9e846ab173b2568f4ea2181f89ed5b1d7b5dedd54d637866d7e7afa99bbe71be461dfe7a6a5b15a2e65614d53213efcb60511f073d512d089f7ff36b0cd000024a4d75182c600775032416911a40210d9f13415ffd99b6e3f23b3d2d5d76d487066f454abd1f5c355463503e885fc920b549656a17f1c8fec5bbb871f9c1ebd085eee6eef084e98a82e624b270b7cf87511ed07d6d045005e146bdcca32ae7ff22ac9aa380a81f3a0727a4021ab4bd2c03a12a71b343e5502dd78fb7277e805ba"], 0xe9) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0x4, &(0x7f00000001c0)=0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:12 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:12 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:13 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f00000056c0)=@generic={0x2, 0x5d26, 0xfffffffffffffffc}) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000005640)={'NETMAP\x00'}, &(0x7f0000005680)=0x1e) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000003c40)={0xf13b767, 0xffffffff, 0x1, 0x0, 0x8000}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000005500)=[{{&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x3, @local, 'bcsf0\x00'}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)="de0f1f2a1670e54d3a7997d11eb4b58d23bda99fc1d51bf5702351ac856341f0fa", 0x21}], 0x1}, 0x8}, {{&(0x7f00000002c0)=@rc={0x1f, {0x2c10, 0x2, 0x81, 0x2, 0x8, 0x3ff}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000340)="5fab1d194e116740d7e4bb50d66abac113b4ef3d365eb0f4baefb8099f54bbf048a1c21070fec8aac7504e7cec79ccccfcb899899706d822cd5725d80af872f50c6d20880ec53180a0e88b3ab460f8c67c077a4ec728ad58876132c00f17e098bfd517c4787393f74994937d26550a879754934ba925a21680c0d73a63fa844a609de74bb88b09188175a2ca526fa8737c873aa58a884d5fbb0bd59a21", 0x9d}, {&(0x7f0000000400)="9e22fa685afd90573cae8de9a850c60ca9ae0c99c6b4b8a1e27f40fb5c44b82a50276717", 0x24}, {&(0x7f0000000480)="c6263cbad453ba2b45945b6324bba038cc552448fa02427f3a7f3cae127a435f440983e71a65ad6424a83a62517158118d943109685c3438d63152acc24f06c803739e98647efb01eb2f214939a25f88cb1bfc8276", 0x55}, {&(0x7f0000000500)="5b3da6cdc82a7582b5a4fc5ed028aca80258675e2bf72881993a9c9e16d1ec215ef2198cfe7f7b1e519eff73a125276477afbf7c98659647784258c8c4d16ec420b6cf83205723f3f6ad82bfe1104c1d08bbde", 0x53}], 0x4}, 0x7}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000005c0)="93bb1ef63ffa731ac056bb28a168399da27d13ec272200cb1269b5d815b51e195c4eada4318a54b863bcb536514ed4e2fda5ffb8a75ab88df14e60a23b66c8b9722ce0f3db664b757d4a1795a0a5d4986409deaffe6f50a98a576bb3a1ffac6efafa9bbb9b1ba96458ea2ecadd55aca00b1a54f7cd39afe13994bde3aef789c90b54a8e5", 0x84}], 0x1, &(0x7f00000006c0)=[{0x1010, 0x0, 0x180000000000, "570047c39210897f60d492534ef2a1b9ab8bf0f6642f1282da78a05fc466429053fe1a7212a7490c62e9ab8cc361321c4bd6af46cadca768450f9ebd006a3dd815c2780742260a6ea778d03ee9113ec5c422ccd8cbaacdd71f5cfea89f2e8c2fd7d5a60db97f0817ade5658b5e36cc3d66aa7deea920af0ab8a8f0c0e41b5160b7d78fc89179f3e224134d79733110988a800db030c5fd92099d644f697f1223cbb41f7f527d66bb441668125decc39564d5cf6cd32b20e898f436b98d1dc3fac33486270f711793cad86dda09cf1cae697c974928dbb2a2d9e1556c511b176d7622f541a532b1b8a53a9f7776712c2fb877f13693ad7191d16c70979fda8f18fd57f2168e2cf25da3a83e1e5a7e4264957f675f33536550a59d8f66a6081de74e06ee15b20567dfd7ffc09b6206e67d108fad2cec56078d16e5d1c6f170c557c5863900b722ed34fc7719071935a21309686e3b5749ef0de2461135bce4122af4e56b067b2a3298f21bdf75f0e782e76c7ea26f382e01bdbba94436b40adece95cd08a9e6d1a2484454470691d13caf53d1638d480d9844812486ef9e9a96874749fca615c70d76d561662821d84332d99b3740d775705c68c6d64922aa09cc51430df252331d788adcecd83e20d8e2f0022ff941d0c7d3bb6b40a677ac4c309a919e97153a44677bef967485ae6ac412a8ad4af909ee67eef688745a74162ce760d1a9c384fcd1330dd2385112066f0bd9bd3d8c0b7609f3444e12b6be88211493efb708bdabd104479c3bd5a002b9a2e92297790bef96aab5546c3b6d213a74ddc85c0e26ebc570c5dc5b8ffdc56e3c434eb13a74e317321f7553915479fa13512c004be0c84fe275995f275e9ebdb5e5dcd0368eac0d11937ba4dc3378d5e587f0b517813b64a766350797e7272aa54514d2858e3ae757e3124871cfa95271cbd9a6b3527c40bd51636f00dd5f5aa91422c850e39f2cd3d30a0657ad071b087fa9f1bfdf8c1d42ce52347feee77076ce31b612013dd5217a9dd0f38f8090b97fcbc17334b2ece609e5b3d88844d6b1a841cf5d13cc4d05df3ffff498d135793227ffc760c4327e5608e5601e0a7b01b7cca4d5e46d94c66ac65f56140cc9a49100cdaea49f40e1601e57e1d36df29dacdd1792bb6084b259b3ee57ed0e79dc982ac7c92bc395d04a2dcbde679cdab166145c097fb7bc31e15c7c351f15c3c52e59dcdd2cd287c0703dd0d2d4b90e797bb06054b1316eed71db40674545ecc4a4fa8fd69e6e830cd12eddaac2b0886592b4dd0c1e0e524a782d27785d3eecb0de45ccf573c3375f71eb2b7e14e2b2bbe00630f0a3605f86ce87205412075440151b9df2837b9248b249faedda957499abeee11fc19d47c68605063f5ebd7d3e7e781888b449822a69812ea2303ed3611d0c14ce0b7933106df8834e6e0f8c20ae4e57976a89a1af6c0761d738cbaad1b172ff7437bd2df954a02b906aea5bbe0eaa1fd8f35df870b24204802ef7fdccd38b419d76785bac220796042e0308833b44f252d723db7349ce399cc1b2212289e324d1b892b28b58bf8740f494843a8310d8e10551ebc90419ae8e3b8f209c826ce6e85336c5cb0e83f38f5af5cea26932b91eff8235b589adb1e16afee8d5e63b739ac5341839613e694bccfd25662eefc203f8e37f1727d3bc253dcb7a2ffe8f8040d88af556d5c47c80f80ff504e7e15111b9f242d41f2daf7ff2d0bd391ce5522c9e918d25c356252e65b07afc8a6005635a2544aefc8d9ced668862c25251fea6c39ca1663cb2f2fd4b82af9e3ac4c0674b4c368574dcf960adc8b8a142769f3a36965c75b9725f0fdf53d32a7aa232df0154fffc4b88201a77db602af0c5bc2115c97e720e83369300beb17c9895fe7650635e6591d5df1e4805b5b0c50ba1051f2529bab349c3d16df72b544a89aa8595eb1008943e20a64a70953c0728e6bc4e9a1855906470c29b0533b29c501b8b88941826ea6665c7fc4d927a7f81c5757e84358f6978049ef0e4da8000ae059e5e5b0563662c1cd1e7a6af8c7a8af942bab4146074a308db3a0090a989db6dac12604a6694a5965039068970b54735034227e0b3b06095f4c5de956133abbbf09a229d5e53a101e7deee150db0676d2372ac6fbddb2405fa2b533941081f477169fafc1251683007e0fe3d8fa56ab563c7aad2050c94310b680109cdbde06822b6c9de0fbfb46039a454ed7e195bc2f37c491b850152c77ed7f519dfa3094d716a98f3e8f43c2666d2d420ce89ac640aef8373cc5e14234e2ed52563ff1da20b8ec1d495c21421fb9c18c8ddc749fee242c3e464a8bfce8b90a62fa4e62600d919460bcb9894e49eba98d1073ddeed9103e3403a2d806a94cb04d0cebe71d39c9859f87e5da214c65111066464257fbd3110e75d22ee6d11666ce1329d536bff94a57e187a2232446a5b9d131570c4c0e3d82b59ea8834f14608a9f2a36e66348577dd69616141fff3adb47c9da7468124b35bff9dbdeccee5045444fd726b6507f1c49790984943c5a68338d1885f20fc5f51d1d7cee82816d6032470f77c6e56097ef233bb1324dc253a25b30f0c06b343efa266e4e2c6ea1f5078df1ebf1c18c0f818139e402e073ab76b31a1af100e0cfe309be63a71e881735a934a13af572608e8a95775d117e67667d99e57d9a1eb368e072223014f70424280f928ff3741bf30edc8d94666f1d1206aa34716a398b9194fce28e55d6b146a9d3c543df46249d20f0d9fb39980b596da5f77f3c1c114abc8217482bd7c6650ed0faa15a841187b9c4394b882fba8e95b840fba9aacfa0f7ceae5cd499e0e396330fb4c55fbfe15bf4f4f303ed882287368e3e4b8bb0746e2660031e4ce2eb52aa245a4dc2a17c12cba8fd4749490cfcef7b5251a1b51383a99748443564f0c133e35728047c6e6766e1e222f9f47b86ca5fabe9537bd2f52c8b0d80372876ed16effa72951a2424467ccc1b4002d01e04c4231c9887ed43c19986c82407bc08b7813190b0a1f4f98cbed1b70261118c548aedb5a292b157cda63ded220b4334742c10ea380faf643685cc7553dee5c9e42eca54853c7c183b547b13b7fd07429b814b2ae9781ad567535fbb97d399e16014744c1682ea7e7335bcd89bee3b4b37c6b06b49656d7bfe91c119b855a2d9aebf1ecd98da6c13b6ace245eb1a08f105b5d2901a57792a461899f651ba64c1751c2fe3095352b962ae31a350fa7419a47057c3eb03965e9f62c5243ea3292daaa6077b4c3873aaf99ccf54156c72e223af649cb9934cb5a6cdedfe0e06a657cd8fe184aaba0b06eab60642ad891ea26d2d97f3673a11e9193c8a486b7ee241517f0245b845040003135b1c608442a744bb24a228d200e6c865c5e1205794c48ea980f795ddbf61d81f304f1734a820f41b605e4d91b5ed190fe3f040d46684254487551922360da262e46e6a6b5cd7a5d5f0566416bdb5fc3e34febf3eb0115d9c822bfacc71c9491e71d7c2dd8cde82ab09e6aca50d7fe5c0473b40025bd520b560cf1eb245ef9e2ea6b81dec8da26c2eb292e98be948a14b0341530d10b32577201c2bbbfc761cc46e60a7a8544886c8fb6607968453935de7d9beaa581a1113ac63e535b01865e79e9cfa93b20a184c009b9cc3f247d43514ef1e93f22b231f490f5c6a8b1b63f3a277eee1ace957824531448c05f00bedc9e3dad0104530ab7923b3dba838491c4ac72b56d19c65bbccc4e72467cfa8f06aa4657d813222970cc6574c65ba8e00ba0b462128d8b7e5c1856404352653ca423a3392bb7270a004c3ca2086d26816801b28b7b18d642fc71c6f4d567c8a7e7e34613a8951abd8e288ee415a8f4f830669067b3767929f3d42ddefb60e882ac57448e459d1697050ac896dfccb2613bd79369336dff1419f98dece168c755a940a9703a661c1268347df65a4149d1c5ecb3e6a4fbc3470a20984368153c96c8006344189c45d0b1511f8f214f789503673b7f9e59fe0c18ef5c952a1aeba270156f29d6d50c937199965f8e7a8e4b68b0009279507e105bf6366d594c123fde9f43253b321f587655e94974568ae4d911aee4ef9b4c5887f54274a2a37ab0e40897a54748c327d27090d6acf516c68447010d85fa4d18723c669a4020c787bfeb811fc78f658997a6c3f7f1b1fec5a1cefb34235289018a36bfddc09901ef25efb9a0af9030c76657f61734d599fd58aeec8b3e1ce0cc07b1b6aef3812e5156436b09b4fc6012386c3109d519e2db869ecb8e1055dfcc9ceae3e3f4b15db1a13fe4dad176c248896b8bb04cbc8ef59c90e75e3db5c47b17ce75e8d1b9052d20b1e09ee7bad48c6ac9cc6060fda723b4452d3c1101c6f56f1c1b706720ac7d08b867613cf164541909da81f323fcd50ef2f33703fc97f7bda03254f3188e3f7f7ee0d29daba7f0111db1f534ba195925e81ac869c49faf0fd7cf518ead8c686274fc536690ad861ec5489e762802f39ab3b1d2c5e9cc84308b3dcffa293967157631412f372c42a968020e4bf65f02ae3dda9ced5d0789ddabef8457f270da64de7cfd39775d4094c5747960452bc69b98a426b976ebec93b4ca3c942e659fa89f05c49e604551996d257c099b6239f20ba57d963f7abd2a8fad755c3a5586ff29d7f7463860df19d98cec511b33c6b253ca60f2a8b9bfba505f6018146376d8e3a38ff4577352a4a5b28a90c6b23593b018931561e3c76097a8c8c0487f537bf8d373d92899cc0037b2fb3c1982e7549c219bcf3c057d4da7f5bce9ba79a616b7622d9d200f002b3a968c953dea542c326485cd60f2b210a961190a7151e159892d3364ae9450002e67f0a107438fcf9df39aad649dc5757b5a73b862cb720909dc87a7d17d3e1dc6ebcb4a8975a2181508aa91ad478738dfd55b5b5e353ea2f26216ce0db67edfc7f463dbe1d749ec12c36b9885cfe436d63a161ddbf60fce333dec6e7d9dbe5c248b7632aaf5eae6a9ac8abeec79b88dff08659dd1232125732a6d0cfbc81264ee869e275a00f655fb5efb4acf3aea16d9b64c85530a59b56cf47af1226f1f16b0689336b212bc24c46ee2abd4247a045b54a50bbf180878febacc9076741c3492a07de2a22405f24787e4c8b9f535b6e41ba7ac9aca23263976f31291848fe8d958427877b01536fd169fe3619c26cea02268469b6a0b050cd14c3fa1ec5d7cdd09c117b194052686c63f352ba4046c1c9ece114d844b4836fe308c11b8b6cf50fd4e97b538da64fc40e0843fc93ade4f1bdfe4d9c8f420f8e7a556399e59a4ead50a1675b75b26bcbacbda6dbcc556ae198311674939bde86629fc460ceea97f74b13f20cf90c27f0503d63b01cd499af485a06c120a6018ebdcc1ea2f2220900e545cfcd3d15f000f17cb1385a6bd5472de90973564d5d1f89872a710ceaf8a531792b019a6f15a93aef1dd0f03d4e0edfcc29b51bb5b29890d42f126bde829d85d416ef90a141e7c500b0b339eabe108fcb73829232fc93ecd1c28990e0e42d06dc2e0607d77f199689ccb503fdf473a7057dcee89f9da8c0af756b440cc812bb32ff8d0fdbc1ea0e6ae23684df424a5ca09960510fefaf99f67cef7a43b1e17dbe79334d8e869d2cd6c918e065dc50de608105c4e92c62ade00933ff47575dcb11ccf2df527847eb40549ebae030504e07b675711e554ef1f7a6ebebdf4bd9fba8b54f719d6b183138d990b816a03f22d130b92d89a9e07acd4537a1f9435663e0e150e2a1f68c27c8a"}, {0xd8, 0x102, 0x7e87, "16de248192646db2b74dbf67e02276983d901d428c47a4e9a170f288bfe8d92e46022c8e9b6b285f571fa7b786386508b447fabca9b4bdf08f752e648f1e7e3e8c884bd41d988c327f2f57b72f7e1e8ec5899d5713afe7c58f55c0cd3915ea6c6b8a8b0beb67ef47db70226998124e67bc37df1cd0b89c20273773470149fc76ea305c223f9cdf95a1876d2d9cf85785dec2595c03ae8957c6c475b2b65b125e5de45ff12177dfb507865eb926924ba8660d3f9dba0e9598dd224c87da3301f9d0be"}, {0xa8, 0x1, 0x6, "106d7d97ab93244b1e732ad9928bb0070fa03f50d5e10f24464fdbd2675189e24be5f7d4da7f8bec9d8e586faf144a17d70a2e23070d19b528631652d70002df6aed61327e8ef04ce147e8138636c9b509a09e0adcc139d6293135c6199ae091c2198168df321d3e2d5ce5061ce5f88bbac2e65050e4763129dfc944cb44eb720136ef1f8e56589cd17adbecff1110c68c"}, {0x38, 0x107, 0x8, "c2393bdd2106da742a6f7d1a5c679a0fbf48dc449d0c7425f43cd775ff2805d9b9e2747e68"}, {0xa8, 0x19c, 0xb466, "59bf9651cbc29653fbebf26a12f059c488a4d52f2e4dabc7f9b0b03000bf19265e624d421f6cd7b25e63f4dd878fc14b0c1b1d859651a1df7ee1be3e9a8b31d7d0b197206b78914bfaf343c2ae49f16e73433ce888a922a34da1b34cada0df4e5a993f9977beffb87f1e2b9204ce4b60311945cc31b2a1bb1262a1d7661c56b77c6a367bd3b5219e085f0a9e3ba6b240c1"}, {0x58, 0x19e, 0x9, "aeeb239ab3206f8b0671b84df01a6c5bf30e99e5e24e13cc6e7fa392e1bf3035f77dad77fab2366c7bda2e35e88da44dd177a7ae929d8da7437abcf5caacdbabd0aac5c34e59b6"}, {0xc0, 0x11b, 0x100000000, "8afcf01e6fbbd1b996a971e9accd358bcf54f50112c958294d1efd17e911ee156f59871ff052fea152d880af8556ddeb199ab83653059b181f489a8a49c8fb5f9187290f927b34ad79a7b6f8be531c67810d3cd23ca1215b1e2f2db944fe4e8f77f15754a456f7f14b0610b6e425fa98fae70607023ec22b2c63a766ac14c0d1e520250df81cd939289cab6eacb8f479ce2a835f110408096273e372498cd7b4137f4846e926d23578ce3163"}, {0x10, 0xdd5ddebb0ccc0b4, 0x2bc}, {0x1010, 0x88, 0x8, "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"}, {0x20, 0x88, 0x7, "91becf107a38b93b9af8"}], 0x23c8}, 0x1}, {{&(0x7f0000002ac0)=@llc={0x1a, 0xffff, 0x1, 0x1f, 0x0, 0xe5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80, &(0x7f0000003c00)=[{&(0x7f0000002b40)="aed832430b93825ae4b49dc2f6674f2fe38600a5ab7c3fce3e6a17ef7aa17e442f4dd79da683a969107d9763d081a29dafda715664499690cd7a9174d59e174ee9c79f0ebd10e646c5a7dfaf17eb38c5cb109b7a2cf46de7e9a10e9e37ad0f42cf319db4603860cab66c7dbdb600598c330b393a5899d835a5f21b4e89a37f311cd223a6a692319d520255bae6d3577d9c147a6fc873c12a947371e7a7cae72a6300fc3a135851fe1287cae2a50f78f80522694981ba0f74dd7bd26e5e9db97e88f13ae3a6ae672f0aa98d3ab3f1aa9172dc465e8aa1428b0607ec5b6563d6e568c6d3c13bfcb9c2cc7eb7156b4b7b2d43aa107bf4a46443666e9945c85382501b30a503483ef59c91b7828db08ff301820692b99db1dbc8c14ec0258d2f71adae128ba6d168bf4785ab0210b02e67bcc9d43d19db579e8e2a75f255eb930b6f87490abe49086788fce6fd52611ee0cfa8de9863d35fc9596ca9b63eb682f0bbdddfaf58c1741b786e4789897aa4f33cadffc9bd43105ad602d485f38214ebd810325fc835b7898402322b8d5cd7fe73d5493ae22bd2f9c2508c34034722c353c3cd38b101ed220fac714a1d0d738e4315c19db4e663889d1836cf4f670378bfa42a345f44cd6a5cd1b7f533e196afa20ed438f5cf7f7a2d0619246673f16516140397deca717e21b2c7aa58faaeeb95b4bc84213e74fe6f3dcccae01acd0748f7425b62fb781e859606e5fa923598083df99fbfb344c19454caa58e5849e0e2a3fc1a56893608e781cbdf7ff59ea9aa67eaac83e1f6222695d60316fafacb58322106de5fd121c3abd6cfb5c9dd70c854b601f49d98b928dd96bc725a6baa8fa7da22a3f655b9ae0e0a6cada605b2d342dd855bd5014259e38636032af8e92389859c6f40ec7a6a549937557525b19bb38289c412cc4757fe94a7002b7325e83a7457f7f31119bf69303c4bee7fe88e635f4865a66ed50bb0bb1081cb1db55e75b376fdec472d3f0995f4854fc090accadd658cf91d020f4fed067ed761c7cb75327ade87011ccc305bd40b3aca6e012b8f7360518b9b129523af5123e1d94e96b1f69879907311f608af6ff092c60c6b608cdc1d0becfb01687544984bb421fa77dd456d1a74cc3ee104598003da52bfe95aa5f8cbc10eee6e2744e2cc8312703aabe87f9ab8efa44deb6f6176280e03439dfb83c3158832441b98084c2d8cf8fab9493392354ae05f246d014d6c2d953a94bf55d11d7afccf30fadc17b261e6cd8356c49448c704e596e63292b5b2f8c79e78c6df7aa4df46ef22e9809438e5bd40d2cc7954433dfce6081e0c43cec6d3d72a57bc6b8669206ef2cede3bc56e13b80ad9c1e643533a448a26bf59635e3f70b90e461e2f138f8977993b99a1de2aa69a4482a105427a7a6356d5d49d15b014a5b081c46d59655e1b2efd1e32cf6341744d749b4884df41bcc4b225ef103365ddfb022e8b47c557177369516a36a0bfd1a98767beb2f69c57da47eec2f6326dacc4e8487ae56248774ae519ef5657c8251777ec73d599c721f3cd6138cff55cea5d7e09f6bb6e2e053d68bf1f515ea59873a149ac8f183faecea1546b8598b96c8ef427891486ee7db7e12f102ab0911df55db99f46dc4e269886c11a4b9251644de7bade9d08fc91e1fdebe7d3ffa6fd4ae8a3267aaffcb8ff5949e9efe6b2dd6a86a132dafa6e4073c99ceba9e877ce80106a7990d6cd14f880b27ea2f36e8d0b1b1bcac9893e6f830fe2e3e9faaeb1a588b172c94ae5fe9c4ad64c2467eeb8678bd9a099e97aa6d67cbe0f116ca808b7ca402d9d96b04d9b168c829117c9e8e222804b0394600cd97a109ba286315224294137213b4ba7d704151c489b2db9eeac96b6abb97573b8a21264f57011f5ade1b579d5ba6d8242b9e6457fc9b71ab1b389829784eaea03cd1bf7e9c58dd67ad18f00fe6ade1e9803752b80dd3ac2a35f9c4a15045cd7f982c34fe363dd278702c1656b18df6e809234effa845689e8b76ba80e6d2130f21c993254f77bd1fe06d65f2b89785d07090cee2a70fa29c05f70d56a964705042de642e4a930e5709fd08292ff686f8ee0f731253da7cca09e8b6749c1d0aa2caae2984c254a332154e220af6070700139c1daaa877375911f2c90b9b86cce7f3183bc0a643abb31bccf179d80f299b21a4a84e3e897ffc52250aa4e0b897e2cd7dbfb954921a2a9c966d386471f87cb33de6eda133f3f99425854c7aab3e4e271a5f346ee36713b8fb1d931261ccc498d3f27140a16c176714e0fde34d59b7f61ebb6a9c13d058f4cfb0e61d840af9c29bc2c2b4fa389d8a85cd7c656815287e96eaccb40aee44a0b1e4f41b15b371ee845b981500fa210d07da7c8b3902a5399818a46c2a96d01d52a4141d58e14fe54546828b1e1d84f08fc91ce598fb5c6c7295d4dd0096dcb090bffedaa4415a759986cda9d16beda9829e508807c1f51bef121e2b65a9d29593dd14497e76831eec52e2b9d8a981adc328029abf2516eed2095da5084bd5d3445a73fb5716c28c81b72a2bc42a441d3eeaa120cc166634e05f36d5ab717102f9ce1801b2081ffdf557eef04d72cbec593305dc4b7a396ae16c76989c5e4c74ab4229faca9502fb9bdc95b35a69efc15304ac2acccf348079d5194bc12cd8cb79feba68f8271b20be37dcd72a920281097fea2c2e51a2aadc45fb25da2c7b21ae07e1311fd59569c06b747f8f99d90e1c2c909b72514da314c3a2a9245bd83c54a52613635d3e43ade0154fedd5b208b57c2c62bbf92e11a4c3e2eb5875ca9df08fbfcad7827b93bf2a93b8893accd675421044a813e976aa87bcfb7c59dc19bfe94fee8effcb186adeba63840435495014b3f65c7d985cb201a25a66e889ef03b5d09a109fa5b7adb4b06d47a441dce09b03d86ba75990f0bff1bd2a2b344125580a97a7c4f475a802b30152657b59b97e5a250c64c2ce178a1a43937f880a1e54391cd35b9dc5889c04fdcfe5604f4da6ddb0c7b2981b375c82e95f1d85acc2dcdcab5457f0d928c803a2cbcd7f0dc61eef7300dae488e0678c6ef1553ea8ee41e46c249b14d091b9e72f19c3b0a0a6ea729c6f6dfcafc904da57e69352d42baf3ef26836ea21a5960444054bc2fd1d5288737d2b434cff087c292036ca71c99b99b06db5bbb9e46778dd13f600506b6ce517dffff1128e7bee9e96cdeb7ebb795d360819f26dc242accdf59d56e3e42c6488f1242963310f3ae50a641197fd64220ce7ac62dd93348cb077ebd909b8109b79856d0c184d8291c0f42454e29cef75a819c62ce327be59d31917c4b6ef85d012599cd0d387b62e28ab250b0f36ddb7d89b9f83af110a33f2ed152d5b3210eef831fa4a6fdee6311d39a5c8a4a9b19234c78a4f29c251884703a32ab48763fd98b1ba9ce1385f9daf144cc078dbde10a17b10d8d9e0cf67d9d1cd4187ebf41e2fe65e05f63d0852837d66485be2d0e54d216269988c5ec824c1c664b5d8c7c9fbc19cb763f6bee1d570de073cfbd7bb809a884c0184cbefa6bb22b7c3f1b3c7b802105097ffdf8d42f99f17ae584cadf4fd7559c17df2fb6e287fdbf79b5c04cf8745cd172174ebd119cdd9bb890a3fd7d63f67d743465f28babc7cd71419c6de0605ce0791862fe5363289d98977db62fbf100bb42d13b1b0bc0fada24ad341dbbf34cc77ad4a9d62cf52174a02f745f0214b53bb23229b22ce07e5b13fac4045633ec35b0b354aadb7704210102bb0f97e7a1e8249f5388b18b72b93fad8a0dec212b3fd9b41ea27237f4500c91fb955db62034f3eb60e0148fa679f736032d064deef0540b12fb5969d75fec1510f18b74139e9241f62268edb59602c081ad0fc97d90f50f38273247732782b5731e53c275d02bfa51ad92ffebdd5bdb4acc6b7f112c79113ad0fbe9cba605d62fec5316e0e241e70ea716ba3fce98dae90d62fa1522d6485ae2018b43f796da4e6d06716762ad35c8e11cdcbae71e118dacf3298c66dfcf7f7f5f852e3662adca3493c1bfa26f1a6343db4682e5467e8fbb62ed038f37217fd1e8e74fb64371d33c37be611f0a17a29f6383d9059114b875833b77e64afd2724164e786bcf3607aba0b9118f6a4d73cc96b480bc41ac8c307c93ffff6ac65057ad066e0f98b555a3d4091442ee238727ba36fee3e5dcb455323e99a7fb22040c151f8edd57af0eaecc89fd0ffa97fdf01076c50970db1d42ebc5e3f274d35f3fc821825f47a4f549374ee34fe27d564bda6d0c0a9b704e34d8e0a3ae3fb9a975ea5378b7bb7c7cc5dd345901fbd0eb1c9e3d71a7aa2406064a591d2dfaa46a7c1d6f16229f7e281a6fcc82a1719e7d1cb866311ccf60c61009bdd56e218f0b39cf2419b6bed99218353f2b0132cf762a9217591ffa2a55dc54e459bf71fc6d5ce2e2e4eb31e4638d20ccbe8172229fa841b4deeb0258415a7204d58283e5e8bc6d3d4f620fd0ec8ea4fb02cb3c9a15e1d083258c7596140da16eb0b3159a32aa0f108e1a242d1f78317d5f32c0a5d15c18a7d082acccd3119710c08f279809b42cdbab9f135a3bc669e77a4bea14d430fc837aa2c81bb354d2b8bfbdc34f32c96724a7d61c2bdab53a9dbe1881d85c00bb3aeac20cd1b2d17a527ebd04011fc883cecd089c9715abeaf925a79990a9bdf580dd6fedbe998303cc24bd0d0edc3486659d5dccbb15818a6de7bf6ff0c6d359c2f518e3212b27d3ed5d77a0b9b5bf642b9db3c2328f19d27f9df168832cae29ab0165820995fd97466b94127d9072146dcd6ee61a16a8f345c6ab9670a3840712b18db61ae1d67745ef84c9cd04912385bc65b550c547cbe96772c84cd7059928245d739d7ddfa82151e29aac097566fec9882a4fdaa7df61112fcd78de0de08205d488b3e87265450c86644077ca33685e240480090adff82fda96ca377d3805d14ca3cbcfbef1e1ddb5390148fa8f64ef49e8dfc7640de44829fb371bc98df7e0e972985c47492a8d18ded22ff917294a7377527586ea8ea55ce09b28d9ff72b2a2e550ec57da74a110c9adacbedd846e251eec5d660d00cc2f44fb0efcbb4b6f0e28ea0e01577e506c82cf209ef4ec223ccde86a5266b73d4fe506f5801c602629341067580a862dddbb01f91701a252bcd1fecf7321e04867750d8a3eaf96056792fc2051020063c14000fcb0e32d45410bde25519309e7511346e9cd0754927bc67b70cf05a1479901d3769629b2dee32715a5a31ed33294a200d6ab8cc00eb3b2801c3f9c2910832c3ac5b0f0d56d47b8fc41094f13c67eb8f3f8b98f1243608c55da7b1fa58ab3c08f8694aa7767e11d804a64aa04bd0a5f5ee3198da4e164e00cdd78d2ce975dc42de11aea1c02151692009db4986d5dceb03e4890f7abf7404a741ca7ab0ddce4ea4f55a5ab11c5fd1117563f54c08b35adee993258373640c231301eccbe8f7e87c4761153117b2a039f38af0596d234decfdbd9dfae2f1e70c9d4b4d574314104cf795ed978c2b049bc5251202dc77e54cffea7ef02307b7b71d33f56ad4566413210a44ce3d212b87dbacee9cfd3b216d45683d836386226f6094ef081981ad8f65de8951864be5595434ea392a01c3e71a0313b1860eccd034cf97a7755024272eb094a3ef4ddc9290f7562d4a703cfbedcd3a2632352aac2b84f2ea8904bcd851c4f3b87f8b141ada664872852f097852fbcded4eb7e8b6ff2960be747a658c45a08473d1ba4bab4acd9e3fe64c6a23bd1acffe08ad8ff1465d2b11ec19e367", 0x1000}, {&(0x7f0000003b40)="f2bb07749554404d78594971c57875", 0xf}, {&(0x7f0000003b80)="581ccd019381d0a098c7e987e0e2192200608264f1456f6b9c68a51526df23c9403864ad8632c2e65b454c7e705145315818407a4636a3254cc79decefc018c6e13ac9196d6f230e7751b039d830614111cc8d18ee40b75f240653dfd5c034b1cbc20b9d5391f464292d2b5d932a6150420dc895cb08c40769f10690", 0x7c}], 0x3, &(0x7f0000005700)=ANY=[@ANYBLOB="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"], 0x240}, 0x1}, {{0x0, 0x0, &(0x7f0000004280)=[{&(0x7f0000003e80)="665e12c4760637b11ccd7bd6b720938ba81ace53433e2085b224fa8f15599caaf3472422f5441c796ba5dab0dd04161efd5cb9b41a94ed", 0x37}, {&(0x7f0000003ec0)="e51ae3b6a02c1e55c4af949ae69db29704f5cfde91c4d1b0cd6d2efe038c7cf498b7af0736fd2793f1240af947e11fe10c10fd72420fc5a51330a575fd50c3c18f31b58100992df902abf3484a0269e954ab67de3b7784f96fc271266355416bff7b040206c62f861fa3abe0390006757af1399f822a7a267d4b12a2345022b2", 0x80}, {&(0x7f0000003f40)="891ee8347292577d96220155ef9798d53f4a1fe0a0715ee02bac8ec0d34092416d5a968d057b61f7aa48d0ee64ba87d522864bfbf665c583bee85ef8bc895daee879390f214101e18b3e66", 0x4b}, {&(0x7f0000003fc0)="ccf0c05612fdb494f2537bc06060646fc98bac286b72f91f84e9d1ea209d633b267710e7a9fd2b96d037d8676852835bc34c5cc78336e6c0d134069361fb7ea806", 0x41}, {&(0x7f0000004040)="ed7255b3dca68d578f1235704fc726d5e0d01957b8fcbf4bff59e0ac5e28f8aa3b1480f26a39bf5e84cac82ee4472f8ad7761fe6aa869ae4a213894c11a8a420b0631a8949be72dc1cdd96a60b2c4093cd350f85bcc86c610d6df010e60f72f3aaa0d3cbbdc823035c99bfca25262cef40fb89c1bdcea1635278e08c3396299658d89c7dee44f6f676ce30116332dc154ad2936e8a638efb6d9475a4782765224944912a230063b441f2709dc1cbbaa22c632ac2ba60db2c38bbdcf7f2905f9d966fa3863644906b977786ca1ee81639d4b623842ec427efe5267851", 0xdc}, {&(0x7f0000004140)="c4fa8591b0d3bfb2217c7cfb62cfc1b151a70f69a35fc2825eaf01f339fe9ca8", 0x20}, {&(0x7f0000004180)="88993d562315a24d8c2a0a00c8f0424c851a29e3de3f745c8d0c286f5ab17dfa9f6d9bf61d45fd23546fc2b7c4a29e8338a3e8af5638ca29a5780ce95d4e883430d4003f73576823f8a42fc849d03f0628c91ee3a40f8fb4e28c75eabd05647e027db4baccf8dd0105a7c0ed456f1a3d92f8d5b70f04233ea5cfc797683bb5e60eba6632cbf12714071142b497c3c451da4770378ef95f5f23dc78416d5499434155dfb1c7e33dd894f1a87a2e2c51d06435d5043964bab66c62d6604ee51d53e075d55c942c4eea5a9b427cae48d10802", 0xd1}], 0x7, &(0x7f0000004300)=[{0x48, 0x112, 0x0, "3519752881655970b5afb8670a939398b651ff00f2a77d078210e0378337f248fc4c9d752e271daae0576c8a50e7e615e202"}, {0x30, 0x112, 0x7a0, "cb57dbedf7e0776da4a33fa0d9cc5797d498c623771a23566ce0"}, {0xe0, 0x189, 0x7, "1a09dac016bf8b4e8569c568b1e0856ef4010907d3d553e7ccfffde8a4364395b90570ac3b3321c42531549cc09ed67ed5ba7a7306cb52beae64cfb89881849b30fc32941694cfec6c8a17f72240b2d5ccb94001176e05b06018bae6d54826dedb2406e314abd6f6052f08b9d43b89a9c9fd1e4b12d4502de97b011b6dd8cc259b21fdf80896fd7980928803508fe0a7149e4476c0e7a52e778d326b1207206d86f03ef9c2de60f19872507c747d08ace3b3e5f355dd4a255cdf32f8b6e2fae32924f30b314974807e"}, {0x1010, 0x115, 0xfffffffffffffff7, "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"}, {0x98, 0x116, 0xfad, "43b656ba3b606bf115e20b6a777211e290c2953a2dfb8e9d8130ca5950562611334be2c512302d5ff90d730c772d500baeba7a94ee5fb29ba5e720f1b67df74cf444bf0e5329581c6bf03ad794cece1724e0f2c1a0009a73ebe5220876e2d0a07121383fdcf478a17c95013e1ace73b79bbb11dbf0c0219d88eb689057c53ce2df"}], 0x1200}, 0x9a}], 0x5, 0x0) 23:23:13 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:13 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r4, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:13 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0xf0ff7f) 23:23:13 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xffffffffffffff5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x9}}, 0x20) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0x4, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f00000002c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f00000001c0)="20ccbcb9ae0562f8b48cd9f1b1c9b8059005ea21dc7834af301c4980d7ebe90963dda3fc925285a05cc3d38f5defefeac7f89cfd1079a5baa466717174b758f87b80ec5802e874f7c871f316ceccd71811bacd9c838316534c62f1a0f1efa036a1f1f064eda1e1064c10cbad156b5b121f632bb71c19d974e00a47b267bff491a65d992c11", 0x85, 0x0, 0x0, 0x2, r2}]) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r4, 0x0, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xffffffff, r2}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)=0x3) ioctl$FIONREAD(r1, 0x80047456, 0x0) 23:23:13 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:13 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x3102000ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) 23:23:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) io_setup(0x2, &(0x7f0000000080)=0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x5, 0xfff) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000002a80)='/selinux/mls\x00', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000002b00)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f00000001c0)="60161a54d6c1c553bfd87451c117ddf9385226f9d934096efafd12aced66670c3bcbaea05064d7193806faba72ec7a6bc19119ec919fc5f5207e69c35505c3fb83d05e5fcb5439bed9e28886017b2e28c4c6c995975ccfaac251a61a89e57be8d98f5d6366f378030c5bb2ffb0a7401089d163563028ba1f31aea0c8e7b7b3da8200d1009bf67fbbaa4151cfd16d9d4e573ede0708f787af6d2bbc69e9ee56ff288ce0732e793f8b8af271af6a94403114d3b658bc5e07f4b1cae1d44ca1ca8cd22dc495d922e838f686d24f", 0xcc, 0x1, 0x0, 0x1, r2}, &(0x7f0000002ac0)={0x0, 0x0, 0x0, 0xf, 0x7, r3, &(0x7f0000002a40), 0x0, 0x4, 0x0, 0x0, r4}]) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r6, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r6, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:13 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:14 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', r1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(r3, 0x8940, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x7704, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = gettid() stat(0x0, &(0x7f0000000240)) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1) wait4(0x0, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001640)) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003200)={{{@in=@loopback}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000003300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003bc0)={0x0, @empty, @multicast1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 23:23:14 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:14 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00'}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r1, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, 0x0, 0x0) listen(r3, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:14 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:14 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000018c0)={&(0x7f0000001880)='\x83.\x00', 0xffffffffffffff9c}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001900)=0x20084) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffee5}, 0xffffffffffffffc8) write(r1, &(0x7f0000000880)="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", 0x1000) fcntl$setstatus(r3, 0x4, 0x4001) setsockopt$inet_tcp_int(r2, 0x6, 0x1b, &(0x7f0000000840)=0xffffffff00000001, 0x4) io_setup(0x5, &(0x7f0000001940)=0x0) io_submit(r4, 0x1, &(0x7f0000001ac0)=[&(0x7f0000001a80)={0x0, 0x0, 0x0, 0x8, 0x9, r2, &(0x7f0000001980)="44f728ce0411e4631a1cbaff80041bede5d9211c809207b175907287ba8aca593f553e5f21c409b1327dab4f023ef184b676a32a14d983420a623746fccb8b542c119e7be047d2ff45c0cf56f4e19740324ed8c9c7480bec71af7eef378c96dbba59265149a61ee9df3256d0404d40c793a74b47fb86dce873a71bf9ff39d77e633a50c49a4f2a8cdcc8099a00afe44837175a20591e9c583fcdaa369ad24761e7d890737942c13414dcb7aee45993c0baa265399a1b95fed802c73b63c55433ed5f2705abbc7cae0d194ce892be42846d46c08784ec2e6f5fc152b5204d2fb2", 0xe0, 0x8, 0x0, 0x0, r2}]) sync_file_range(r3, 0x7, 0x8001, 0x0) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0xfffffec2}]) writev(r3, &(0x7f0000000640)=[{&(0x7f0000000080)="5dfaab01b0d84a6d5806", 0xa}, {&(0x7f00000001c0)="89e9c9cb76b4f4de56784463c519e02dd90ecce8585fe3d68c1b2b513dbf46de0360a6a5704b4d77464f0a83b4e6d7ae508204be4347cc69215ce46d403e589ef5abdc1fe1b1dd35a5a704048b8495ff086af05443f801b454b51ca94983e67406dedee09ad444b2ef9d5ddf58cd2159adb24528e570994704c8449a202c0475ea3905fb9c6b8f0bd4a0e09e2ff5275d2853e0a0c9c0813a0974c442c6f0888613b136150e839bb35c9702b24ae5d490f72f18cdeafb6d5daf3cda6a997569a0dcaad4d01b11b9e492095d1f7f", 0xcd}, {&(0x7f00000002c0)="aa804a03058391d821661eb73cc211ff51ee4c33", 0x14}, {&(0x7f0000000300)="84ab6f3a2a450aa90f9c89dc92ec389ffd5e329ced8a92db7cd2141ee3d14c6d198dd282c07f007d9cd7f7e4c6de22a25a4563b40f12666a4404f246d2e212d1cf51f7dcbd6a2950e6a3f881240f33a0533a42d2dae213b22ce80e5be746ca4847984920ab37d5d5b56da06e2dc6fb3ac3b18e819462eeeb88780c764b0742a9a8f5653fed0d9fb40e2e25108d8162bbfc66c9205db0596917d8685c8779b44107e5532082792734fcfd9aa730b806547d61d4c96c7ea323a09cb4ded312782a157a3a8897f81eace78e086200f6e3cf3c7ee8692f76dfbff6782f259e9f3a623991d0b64ccaa9ee313120ef47e3a5f901c149c55a7e6b1d", 0xf8}, {&(0x7f0000000400)="71f17384bf6919df16bcf360e42244765c9a2e8a692b98bbd819b2c4362b12ff18c5e0e7bd23bbaff29d771f28d3eae33b9ef658454b65a922bdf11ef4c947c96b996f7ed3f185efdea037d80ee3b94fe5df6d22f2d988082997afa911c9cc12b4e07859c2068f11b110df9d20738af26b5693487a219205a2274f9fa35f", 0x7e}, {&(0x7f0000000480)="e4e2bad9913bf6f146ad421cc49744f4ceabea1935c420b67dac547eb76fd5ca80d9ced9014b704dd4448808ba9add26a0ce451e6363cac060c0d2c629a8d9b989e2953cfa2566d954f114a22c0b8d0821cc132d7fcb96e4d11ade93b3c56de8fdd53b96bfdadbc7c2fd98", 0x6b}, {&(0x7f0000000580)="bd570b0e39826702d66bd679cf1ed96b361b8cb272b1cda2a1e7f54fa6c946df071f3bb2f4bfc8dedd21ddac7ce7f7d47a8b6b1ec93ec6c29b6d22fe87552d5a2acd02c04e446c6096198c13e0c0047dbeb456b0af3dd854c3c9a2a540339f4992cc701d0056f457a4a61a6248d75fd20583aedd66a69d48c2336ea259b9ae53a9a5a119175721392cff3ba3ba1af388a9d63da2016208f314c62127cc3b7a5683fd4a0684151ff5", 0xa8}, {&(0x7f0000000500)="ac1787", 0x3}, {&(0x7f0000000740)="16d7e07cb96b2da1dd21a6fc3a22b0f1fad9b4792214431e4a2fe8f7b4f0c8f5c56d6b178db6ac8375f835968733ca160780841d59ee88a7fa3b42dd9c1a3881d9106475bb22e50b84f171cfedc1d8d5fb69609037fc88fa38781b66b012d50544d1bf504067ba2259e5feaecb1b731367d39207f012a16b0e6698734665fabddb31b4dd0a3902677519fc596375ff377b824fee06bdae2ccae402be7ecd5d80c86d3d2387d63d16e3e4350111f1256d0697fca9b1fe211a1d470dc3cc5a1dbb8440f5dc6970d36e60997b476b1bd52fa0b23946913f5920dce633d984", 0xdd}], 0x9) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0xfffffffffffffffe, 0x0, 0x1}) 23:23:14 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:14 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:15 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:15 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:15 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00'}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r1, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, 0x0, 0x0) listen(r3, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:15 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:16 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000180)}], 0x1000000000000217, 0x0) fcntl$addseals(r0, 0x409, 0xc) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) open(&(0x7f0000000080)='./file0\x00', 0x3, 0x2) r5 = socket$inet6(0xa, 0x0, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) ioctl$BLKGETSIZE(r6, 0x1260, &(0x7f0000000240)) fchmod(r4, 0x4010) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:17 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="0003000000000000c91000000000000000000000ffff7f0000010708000000000a00000000000000"], 0x1) syz_execute_func(&(0x7f0000000380)="3666440f50f564ff0945c32e660f73fd18c4c27d794e00664207d9e33e0f1110c442019dccd3ee6f") recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000500)=""/128, 0x80}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) write(r0, &(0x7f0000000440), 0x0) 23:23:17 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:17 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:17 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00'}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r1, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, 0x0, 0x0) listen(r3, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0xfffffffffffffffd) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) mkdir(&(0x7f0000000080)='./bus\x00', 0x19) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1}) 23:23:17 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r6, &(0x7f0000000d00), 0x0, 0x0) 23:23:17 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0) 23:23:17 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:17 executing program 3: syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = memfd_create(&(0x7f0000000100)='s\x00', 0x0) sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRES64=r0]) 23:23:18 executing program 3: 23:23:18 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:18 executing program 3: 23:23:18 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:18 executing program 3: 23:23:18 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00'}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r1, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r3, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:18 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r2, 0x5, &(0x7f0000000740)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000200)="3d89f5c927ba6962f38707d0477631dd43ba0897bf52aeb62e22ff8b09bd7fad97383b4060de04f0f5cbf88c875e1d64aa81dae75f36a5280cfa661137b5a31631ba8d795b6d548bc5574fcdb7246630fcdffddaa7b837d286ae35aa3ee111b61d63203ddf0a5d36e3ec4ffcc497e7f2df7fe72c56caa22e47503414362b0bde271ee335139424eb92163e831daac500244a222b2025ee202071b5079016c4e4b5d3080d2a0e841592d4d43f6e7a140e86db00ae5988400729bb1576b6cb94e15dab22be57f95c3814ce0678a04af4e5478738ba0daec6066f9da1086e1f6d2d514f2f9639d63c226fc1b8433af4daff098ad723", 0xf4, 0x8, 0x0, 0x3, r1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000340)="2136fc7592322a3b93f341f7f52114cf51e4511979ffffd540e96a3c1450ee", 0x1f, 0x8, 0x0, 0x3, r1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xe, 0x7fffffff, r0, &(0x7f00000003c0)="e4f4a70d84ce9ccacf275fc28048ab4bc86f69bf1a99c09b77f7e1f8826f97d1ff814ed4c75e2355a5d31a19b5f1a7d903cce3224f78f370e66168a25a54ac6f7e44aee2dffd7b21717ad462771afebd3f288a26d223e1498ebf929c2f518dcfbdcf9400100babd433e9416b034812fa59824edf06cb1c18803b7a750eed7ae6b89187dadbdb5b7d4394cd5a48b027e1256558216fa54522a32452ab8b62ea8ccc9e12f12a9e42e50851da3862a5c07fa7b6fc9357e36617ce7feba3ff226c3a37dd4b195fda1feab447f6dae6649dcc813422efe78eba8752cad1e3146675ae90ddb7171a", 0xe5, 0x7f, 0x0, 0x0, r1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xf, 0x8, r1, &(0x7f0000000580)="bf65f4fcc70caac6901ad6bafbecb43c1e3f611157d366e7b1713677cd4a5379273fc831f8d6b758bffc726462c98c09adf22b09a4308c3351bfddfea240150498c566a9aefd5fbdd6f7e51a04bf4cfcd24910f95b1e4c218d9a4aa0adf3e9666b3888414469cb9e9cfa6635791fb9932ce702eb2abb5f40", 0x78, 0xfffffffffffffffe, 0x0, 0x2, r0}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x9742900f8f008919, 0x80000000, r1, &(0x7f0000000600)="9f6eb5f34968d099972df56fe6545b182bb04e6130a0f5be600c0c8c0639251ee5b6aa63786ace7c951d6dc7273940113a8dd7e4ff38373b41b07d960d4421a6236f55a4a0ecd43b6e89a3425d15df0ab6e904a72037d63766d417acf2194cea0eaf942c45565a99522e1299c5d313885eede26d17fefeefd183088c5b33dc1be842a63b224c00f68fdff533146076e1a8b8b8002b71354d0d33beb63c8fb61772d98b60e9", 0xa5, 0x5, 0x0, 0x2, r1}]) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4001) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000140), 0x4) write$FUSE_GETXATTR(r1, &(0x7f0000000780)={0x18, 0x0, 0x5}, 0x18) io_setup(0x6, &(0x7f00000001c0)=0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18, 0x0, 0x7, {0xac1}}, 0x18) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:18 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(r3, 0x6, 0x8, &(0x7f0000000080)=0x7, 0x4) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:18 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:18 executing program 3: 23:23:18 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00'}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r1, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r3, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:18 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r3 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='./cgroup.cpu\x00', 0x0) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000240)='cifs.idmap\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) getpeername$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, &(0x7f00000002c0)=0x1c) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:18 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:18 executing program 3: 23:23:18 executing program 3: 23:23:19 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00\x00\x10\x00\x00\x00\xea\a', r1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000002c0)={0x1, 'bond_slave_0\x00'}, 0x18) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x4}, 0xfd3e) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e21, 0x8000, @remote, 0x5}, 0x1c) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(r3, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:19 executing program 3: prctl$PR_SET_UNALIGN(0x6, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(0x0, 0x1040, 0x0) r2 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r3 = dup2(r1, r2) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000140), 0x0, 0x8040, 0x0, 0x0) 23:23:19 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r1, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r3, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r3, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@window={0x3, 0x3f, 0x7}, @window={0x3, 0x4, 0x1}, @mss={0x2, 0x200}, @timestamp, @sack_perm, @window={0x3, 0x10001, 0x7ff}, @window={0x3, 0xfff, 0x1}, @window={0x3, 0x2, 0x2}], 0x8) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:20 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:20 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(r4, 0x107, 0x0, 0x0, &(0x7f0000000080)=0x33) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:20 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:20 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:21 executing program 3: r0 = socket$packet(0x11, 0x1000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x200, 0xfe61) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000004500)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="32cae4783d32"}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="050300000900000000002d00c52cf7c2ffffe697b02f08066b2b2ff0dac8897c6b11876d6e6b2621d8d2d193", 0x2c, 0x0, 0x0, 0x0) 23:23:21 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc), 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:21 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r1, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x100000, 0x401}) 23:23:21 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:21 executing program 3: symlink(&(0x7f0000000280)='..', &(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='debugfs\x00', 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x84000, 0x0) 23:23:21 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:21 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:21 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:22 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:22 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000400)='/dev/snd/timer\x00', 0x0, 0x900) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000440)={0x0, 0x0, 0x8, 0x0, [], [{0x5, 0xffff, 0x6, 0xfffffffffffffffc, 0x8, 0x3a74}, {0x1ff, 0x9d12, 0x0, 0x800, 0x80000001, 0xfffffffffffff801}], [[], [], [], [], [], [], [], []]}) setrlimit(0x400000000000007, &(0x7f0000000000)={0x0, 0x3}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) prctl$PR_GET_DUMPABLE(0x3) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000d40)="f2a0e8c3e91c05102ba57aa09ba39bfde4b51d4f62a6c9b020fc8cee36d6f592c6573e38201ff1e2a8046a0f1a85f9c93957f9a60d14004960989644", 0x3c, 0xfffffffffffffffc) write$P9_RMKNOD(r1, &(0x7f0000000700)={0x14, 0x13, 0x2, {0x14, 0x0, 0x8}}, 0x14) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000200)={r2, 0x0, 0xc32f}, &(0x7f0000000240)={'enc=', 'oaep', ' hash=', {'tgr128-generic\x00'}}, &(0x7f00000002c0)="16d54ba1bb21f5ec1adf6cd7677c298ada4bae0e8b3edd25768e3a205b3357c83016d721ef96ddc66a316a44104dcdf1e6e2d97933f2974c122608cbab63719106ee09b61e69a13adfb1b9552f0c475a1a4cb69305989ba8805bcf1630ec97598a4d53931ec3856c34d676e562f9f3dbab2d0599a744df010faf4a937f07eaafae82bc73e3dce5f9a6c692958caecf371c24341529955f74c96eb096ff3ba09b30a2dbff92c0e7da296456d52245e6", &(0x7f0000000380)=""/70) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="b4080000000000006c000000000000000008000000ec5ed7df8ccfe6bcae40bb135506488d8a3a7070a1f6a280b4accc000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000780)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005805000058030000580300000000000070040000700400007004000004000000", @ANYPTR=&(0x7f0000000d80)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008fdfabe8658145fcfa0f87ad10a93695abcaba7ebdc972912e4b58564ab6347c0a59081b7d4dcd73cf715dcc9ddedead0d773eac28558b37a7f99710c8740457a52346362ce9cda67775ebd7519b72b6d92d7da15fcb0affb4ac85ddd35b99e71dec736e305dfddf04f784bc0d34373056a544886b4ba30163f7078fb02a58e2ea42e650bae19cd010644cbfce6165cc39b07e235e857339078c133b1c3d07df0d38b46de27948fd820cdd4d0e6ba8ccf6eb38bb077627d5538306ad8936c0fe6b5f6fb3e841741291c68addf1e7f1b665ff0eb97b5e628ead84c1b1f1a336"], @ANYBLOB="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"], 0x5a8) 23:23:22 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:22 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:22 executing program 5: getpgrp(0x0) gettid() rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffe}, 0x0, 0x8) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f00001af000/0x4000)=nil, 0x4000, 0x2000000, r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000003fc0)={0x0, @dev}, &(0x7f0000004000)=0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)) read(r0, &(0x7f00000003c0)=""/128, 0x80) rt_sigreturn() r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x40000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r3, r4, 0x0, 0x1}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xa840, 0x20) 23:23:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000001c0)=""/99) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 23:23:22 executing program 3: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(r0, 0x0, 0x7fd, 0x15c) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f00000000c0)) geteuid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r5, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x4ae) r6 = dup(0xffffffffffffffff) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @broadcast, @multicast1}, &(0x7f0000000140)=0x78365d095ac983d2) connect$netlink(r1, &(0x7f00000002c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x400}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getegid() ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r5, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) setsockopt$inet_tcp_int(r6, 0x6, 0xd, 0x0, 0xfffffffffffffe8c) 23:23:22 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x9, 0xfffffffffffffffb, 0x5}) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000001c0)) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:22 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:22 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:22 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:22 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:22 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:22 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7500150000000bf600000800000007000000402c00000000000009000007000000200500ca64fc53ab65d244010000008d8a8d24585800000000000000000000"], 0x4e) 23:23:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=r1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'veth1_to_team\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) socketpair(0xf, 0x3, 0x0, 0x0) 23:23:23 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x10) vmsplice(r0, &(0x7f0000001140)=[{&(0x7f0000000140)="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", 0x1000}], 0x1, 0x4) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f00000000c0)=""/128) socketpair$unix(0x1, 0x1000000001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x2) writev(r3, &(0x7f0000fb5ff0)=[{&(0x7f0000000080)="1f", 0x1}], 0x1) dup2(r1, r3) [ 1880.322896] SELinux: policydb string SE Linu does not match my string SE Linux 23:23:23 executing program 4: fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r1, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) flock(r0, 0x8) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:23 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:23 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x17c, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000809000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) poll(&(0x7f0000000100)=[{r2, 0x2000}, {r1}], 0x2, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'bpq0\x00', {0x2, 0x4e21, @rand_addr=0x1}}) 23:23:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x8001, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) socket$unix(0x1, 0x5, 0x0) r3 = dup3(r1, r0, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0)={0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000040)=0x4) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000000)=0xc) 23:23:23 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:23 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:23 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:23 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0x7}, 0x28, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) fcntl$setstatus(r2, 0x4, 0x4001) getsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:23 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:23 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:23 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:24 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000840)=""/148, 0x100000002}], 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$UHID_INPUT(r5, &(0x7f0000000740)={0x8, "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", 0x1000}, 0x1006) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) write$cgroup_type(r5, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000004c0)="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") ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) connect$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) write$P9_RLOPEN(r3, &(0x7f0000000300)={0x18, 0xd, 0x1, {{0xc}, 0x4}}, 0x18) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r6, 0x660c) sysinfo(0x0) ustat(0x2, &(0x7f0000000480)) write$binfmt_misc(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="73797a30e6153bb418fcaefeb23e2539"], 0x10) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000180)=""/173, 0xad) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') write$binfmt_aout(r3, &(0x7f0000001780)=ANY=[@ANYBLOB="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"], 0x489) sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r7, 0x0, 0x70bd2a, 0x1000000000000000, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') write$P9_RWALK(r0, 0x0, 0x0) 23:23:24 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:24 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:24 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:24 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:24 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:24 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) vmsplice(r0, &(0x7f0000000600)=[{&(0x7f00000001c0)="1bbe41026b76aef519f9278d8b50d40b07b5765947e3e8378f6b2121f41f83dcc8b8483330df3cee9395b75ee85786804d769cc49dde520b432a7bfc2b35720e61d2efe41305246065269636916743bb64347d6bc42f00c923afe204cb7b7054e50be54d6061a0826b1fbd16eaa3bd3d256fe02d8f1ac6", 0x77}, {&(0x7f0000000240)="4ab3abab88214200b882bd7975fb880bcef32cf3a1d89eb2b022bb043dd8859a41723df24686d5f30e36f2e1e179a878341227286fccdefa1bc509bda85fb0c6f1cb4e9dd46eb3ccdb4e8678074ff697a9699af95994e667e6695af20d9a20137b4cc178014d63d4fbf4f309f050fdac4e3c428b1680ad12f4feff6372561f7eac380158eb27d926498bd9ba5a7d438fa554474e79f1f999cee3d8b10c171276a2a99284748d4751799665d91a1d32fdf97dacff7813da9f313e31e6ebd01da525c051c6ac5f1db3ce4528e44752e217490a2b4632e42ed6a31cf15b2b3422867a5ec959052c93", 0xe7}, {&(0x7f0000000340)="1e829fb25718bbff9c7d88c95c0c2e93f9ebc6c8814f1d30aa2ef57f8ada72c5ff0939b68c4472a325146eec5c32ca56d785476e9c50b7e2dbce2c2507a8463f2dc6c8e0adfd6083bd73f19bc2bedb0608f8b6e3c9f73b9f8f531352d5288bfd548df6de2ccd635832c9bc66d291e968ef4691897aa866862b69e022406102b3d0fb11d4c4e65e53465d3f44c76d80867ad25e3a72760ea298860b24ba0504b2a77041b53e5e7116315423755ceb8a74933122113079153e37fa8c282063c94fbb25c4ebd4a9fb8af3c9766ffddb5b3a28d6cc1cde36187a0540ae02300bc66b112e3e367a51507a2eee53fe9877ee1cd4a72f709eb5bdb1a955", 0xfa}, {&(0x7f0000000440)="70d80f93a050452e4a1406af9e640ce1097bc9de07b92f1e783aaf1f1f595181a5405f7236d95a5d38ae058831af43f5279f10a452157de008409dd89723cfbf4c17de5cfce6ad95328749491f8a905984130b6e2d8fec8f90022bfe2ec7d6a7a70b3c68a97b2103870e25434d9139c1b5551a181b4c71c676800f04baebfe668b14a6e264421a95499c927acd427ed4f083bdb80dd3966f06589c468ce41438d5a473", 0xa3}, {&(0x7f0000000580)="07b3a68936ca0852ea1ed6ca0d6f4fcff27b302ac0b306c3d641383a10ed9b8119a8d9e2b037918f729007cc2341c9c0e5fe50f6bc02f516da43f9cf4f431926cac82c735a061cc15b1424", 0x4b}], 0x5, 0x4) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:24 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:25 executing program 5: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:25 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:25 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:25 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:25 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-', 0x7}, 0x28, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) fcntl$setstatus(r2, 0x4, 0x4001) getsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:25 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:25 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:25 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:25 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:26 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, 0x0, 0x0, 0x0) 23:23:26 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$selinux_validatetrans(r2, &(0x7f0000000240)={'system_u:object_r:dpkg_var_lib_t:s0', 0x20, 'system_u:object_r:iptables_unit_file_t:s0', 0x20, 0x2, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x88) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) times(&(0x7f0000000300)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r4 = openat(r2, &(0x7f0000000340)='./file0\x00', 0x80000, 0x13) io_setup(0x2, &(0x7f0000000400)=0x0) io_cancel(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x1, r0, &(0x7f0000000080)="5daf34c002c191a556f248fac085e1ab96e7a99873ab5ecbfd905c6fee19af8ef2783d44bc942922d5d231c8c145c95890928637c457447643", 0x39, 0x8, 0x0, 0x2, r0}, &(0x7f0000000100)) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000380)=""/106) 23:23:26 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:26 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x28007c) sendfile(r0, r2, 0x0, 0x2008000fffffffe) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x1}], 0x1, &(0x7f0000000240)={0x0, r3+10000000}, 0x0, 0x0) fadvise64(r1, 0x0, 0x1, 0x2) r4 = pkey_alloc(0x0, 0x3) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000340)={0x8, {{0x2, 0x4e20, @local}}}, 0x88) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, r4) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={0x0, 0x0, 0x6}, 0x0, &(0x7f0000000280)="9ab14c0c4792c1a558a0c7681b4c54606de85997b6e0336c222db581c3d3e48786b64c229bc8e20fa5276d2fe43a0f54f93af9e052a690f6223bd46c2388e6535f0c783597f7da62cfa24da1e79402b0cbbf823c675e0a365cf1eaa5e2d4a00c2854a12c7fbad5feee4d5c9e0342bb1f9ef21b529c53459c337455ed566144d3401f73b1a8dde6c33eb7f3d966fa075e9a", 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x10001) 23:23:26 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, 0x0, 0x0, 0x0) 23:23:26 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:26 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:26 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:26 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:26 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:26 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, 0x0, 0x0, 0x0) 23:23:27 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:27 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540), 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:27 executing program 5: r0 = socket(0x1f, 0x80000, 0x0) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7075626c69635f636f6e74656e745f72775f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a73302030303030303030303030303030303004253030"], 0x5a) 23:23:27 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540), 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:27 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:27 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x4) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000280)={0x1000000efffffff, 0xe00000000000000, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="020d000510000000000000d30000000003000600252000000200046ac00200010000000001000000080012000200030000000000fa0000003000000002030000050000c6a8000000020000000008000092ab000000000001020014bb00200000ffffffde0000000003000500002000000200ebf2df0000210008000002000000"], 0x80}}, 0x0) 23:23:27 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540), 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:27 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) r2 = socket$inet(0x2, 0x80006, 0x7ff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000140)={'ip6erspan0\x00', {0x2, 0x4e21, @loopback}}) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r6 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80, 0x0) ioctl$FICLONE(r4, 0x40049409, r5) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r3, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:27 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f000047efe8)) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000040)) r1 = getpgid(0x0) setpriority(0x0, r1, 0x0) 23:23:27 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30d", 0x72, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x8000000000000001, 0x9, &(0x7f0000000040)="890528e4", 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x400000000000004}, 0x1c) write$binfmt_aout(r0, &(0x7f0000000080)={{0x107, 0x800, 0x9, 0x373, 0x2b8, 0x5c35, 0x320, 0x5}, "2dedb722aafbdb0b7ca3cc8ccbd43d3c0fe23bc757d2c32dc666be381c781adfdb7008611a826668054bac9b290a9a6e61c9404d12bb422b96be0e3b2ef5424cb0c9cc2416d908a6fe0a03a897548ef1536101f52c98ab1dcf72", [[]]}, 0x17a) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x2be, 0x4) 23:23:27 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30d", 0x72, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:28 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30d", 0x72, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:28 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d", 0xab, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140), 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:28 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d", 0xab, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:28 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0xe81) 23:23:28 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000080)={0xfff, 0x3, 0x5}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r3, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x1d, &(0x7f0000000140)={@loopback, r1}, 0x14) 23:23:28 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d", 0xab, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="020b000007000000000021002d54036205001a00000c9a934d4fd100001000e0c99f3d653c00f0ff9da499df0005dc437eed486dd6000000"], 0x38}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x20, 0x0) socket$netlink(0x10, 0x3, 0x1f) clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(r0, &(0x7f00000009c0), 0x0, 0x22, &(0x7f0000000a80)) 23:23:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') getdents(r0, &(0x7f0000000400)=""/4096, 0x1000) write(r0, &(0x7f0000000000)="10d14afadf26509e7e376106e83fb84ff3f7192294b912a5e9cccb6e6fbc75c63088a67c8f6896e377f55f2078646a8f104094b6fefd36d3e264d3c73c17fb079b3a8cac636f6fc2994ef7ff2ce77edf6e437e055861336cce591aecc1be0c8c8201b7be530e6882b4c64571e87f552ad34a011c93e6712ec0fba2946b7a537fed3b5d96d3", 0x85) sendfile(r0, r0, &(0x7f0000000140)=0x202, 0xdd) 23:23:28 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd", 0xc8, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:28 executing program 3: pipe(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0x1, @mcast2}, 0xffffffcc) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) recvmmsg(r0, &(0x7f0000000500)=[{{&(0x7f00000001c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/97, 0x61}], 0x10000000000000d6, &(0x7f0000000480)=""/68, 0x44}, 0x80000000}], 0x1, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000000c0)) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') syncfs(r1) sendto$inet(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) 23:23:28 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x0, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:28 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd", 0xc8, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:28 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x402, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000300)) fcntl$setstatus(r3, 0x4, 0x4001) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000240)=""/83) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000380)={0x0, 0x843, 0x1ff, {0x4, 0x4}, {0x9, 0x8001}, @period={0x5a, 0x1, 0x6, 0x4, 0x400, {0x9, 0x800, 0x2, 0x2}, 0x2, &(0x7f0000000340)=[0x1ff, 0x6]}}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) getsockname(r1, &(0x7f00000001c0)=@hci, &(0x7f0000000080)=0x80) fsetxattr$security_ima(r2, &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000400)=@md5={0x1, "8241ff8b4c671ab1c110d7858c8c0cb6"}, 0x11, 0x2) 23:23:28 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd", 0xc8, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:29 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf51", 0xd6, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:29 executing program 3: r0 = socket(0x2000000010, 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f00000001c0)=0xda, 0x4) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/64, &(0x7f00000000c0)=0x40) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001600050400000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="1400f301000000060003000000ffffffffff2b1b"], 0x2c}}, 0x0) 23:23:29 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f0000000880)="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", 0x1c9) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000080)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x400000000000116, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) set_robust_list(&(0x7f0000000300)={&(0x7f00000001c0)={&(0x7f0000000180)}, 0x1, &(0x7f00000002c0)={&(0x7f0000000240)}}, 0x18) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:29 executing program 3: clock_getres(0xfff7fefffffffff6, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040), &(0x7f0000000080)) 23:23:29 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf51", 0xd6, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000400)='ramfs\x00', 0x2200080, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000c80)={0x8, "5f5539ae7383df635d7eb9f00cde999ef4e1d4fbae589edcbcd64ae9781d89f20a7c347bd734db9d80a3e9ee0d0f04fe5305dacf9e656dc623d0d8abb05b81ebf7fa83533ebfe364612ee7d5571be6e3af5eccf0e26370ff66a26e95f4b7b1206b9d9a70fe612b356ec5074716b0e71eb9f60ac1c5e653c9a7de0de9a5f8c8047f77ece27201fc36e2ca04338864356e123b3b96be97afa5d6698e6f08a657f7ad07b42df05dfca83247581434b575e2d4419e52f1103e9e3ddc440a98f9caeace71f8affb3cfc62e4b428403787ff063d2923a50c0410f191c7923b77c51fea54cc7f2b8adcd2a5e1f53495c168736a160f28435b70f6e40df8523c2deaef8b70f13bc408d1d6eb05dbcae35f0c12cb00b8d589c0dda912acf9315852e1cbb85857f9421cd623fc5046448db22eec3c07358c4778c73a2495bf3452b18d8e904ed88ae250a99edb20b78fc923ccc841847a4f6d514320309afe2f0a075e50096c7a8cd4da2d88791d01a10cea10a97d32e8bb05a5e2bf52be5fffa3fb26953a0fadac598644cf0297d01d5c1ed9f2123ba789fa650b0d140a478903cc23a5b5c2a2a52f19bdd40039ac0291f648f1f991e272c52669f7843e73b3be22103fe0a88d5d405b9ecea5d602be0b5466d18d8a971b69a8e80e48621103a6bc6ee3a7b70b199005241779f22fa2cc159988eaf2d53c858ec06ab56acc232b587ffee3a5cb29f5641b2189fb1617d1a652e42511fe2e447a2636f18ceabc261126200193eb9f309f80aa204a93883bf6fb247ade866685f300295f8735e18d1d81365dbd2bddfa1779c59effed803bbe0a68302b1ab0f0d00892138ad24d52d653d92897bd28c2f031a77eae54ef3ce9a1fc44ea41763b2d780a454f68ea1a297302b4fa6664923a818040f5a74e0db3ff24e940e97d4abff40af2d36f7bceb8a0c5e90dbefbc8ba496f6e42f11ce11fb20655138f9387938abc3aa3a742f749a8695d972c537127519f654945bac96f0a2ef9d6b24f2226ae677684e3eb63041d6b5105777a8e6aa41ff11366448c0af1ddf5e3f2a1d828b4c9ede3809eab736c9035f2a7032ce38b699dfdc3e158e1ce62d325441e1b05a3ba5f663f20b0cb703cb2960aad298177881aa6b52bf4ae112c5d2bb691ac34b0723be7ddcfff0015e578475db1f062c5a50b54bbcba2f591eb4d6de66f386b0d5dd3975229ad25ae95d82266dfb9c1a6f497ef54b6ac5ee81edae16c47e89f9a435377dfac411db459559ce483921251745b8b94f69d4815b009ea86aedc5a75a516ff2afaff9a418f73c2cacbcdf45dd02ba962399f9b81e149635c2b4c0bda790a6d72fc243f6fbc73d0a0636db51c03d93b44b42c07f2269b465231f953e6a45dc549e9b5ef05443da7820cd667f5b0ff47a13f0a3df630a6f98f72e09978b829389d6a11afb0a7a0988822bb95fcb50399e51295f464662118646d2996da0fa710b082036820ae0a60828479bad4489061244b74179cfec74ab273551190c0eb2ca95be86391b8e469454796d04b29646b8aaae49889ffd84e83e33fb0cd7b10d778e72422f474911897dbd4548d9658e9af23cfff0ad4a7d750ab59e0f8988082ab7ac8d27eeab1c5809de6694aba8ee6ff1ba23d422f38dc026a77933cb0fc916d22131f7f736e35c881c5551f13a5037f65b9090372bb8e73bb9cd686715afef6b40ff275a978078c1e1c7db358285e5caee5c53cb4a7b446db91e5c0615342265edd9f09a72002aae56c7ad4269a0513569db514ee852724cdcccb72e8836fc270f7aa03e03e65f4572c2909e6fb1b557e89c3b505ba2f2b10b545513758abdbdc5b3e5ec1fe4d6bd5947b354058eccb79f10e971a85bdafa5aa27224acc734d884f9282ed033fc540defa3181d451713565d940879cd70a1d704b9a390de509351d5129bff18051b0c7ca196a78d3b8d0c8f384c79ad637b2e1770fecfc980960ef403cbc6bb284792cd169133f35aea028d9ffdc1668572dd197db86a26cb6fe1bb822bb76968ef2cd3c384704b75d0f17a50bcce054a400edd3b2f2abf72d2d8a679fdc94216d2d7d43ca1e60aeb5a313f8104f8ae54e75beb6c106cf080b9ecc9a1f91508b37d9ede25a1bede738c3a7f3501391a7b1863fe120ea26c4ff13f1de4588b150f3f2c12a9b9d92e6a8610c788c4d449a91416307a313536e1779bef88028d65a9398c5d1492b729d5f08e34e64fa07507f64297a1f9305a2d68169f653d5c107c9860ca0d822916eb357c646c229e792b1a5da56b35ab971bb82e41581e11f24f9c6b26c019dd2f2f89f2a82b74bd856ed7b46a2d9c07b2856bc39e9a28f271c5bb06db5bfa04d21e37e778b3e03071d25da8bbc91543fe8909603ba92e3455cb0edfe1dc040f12c169a97a5b8fb09f97acda29ab8491e7c9f81320b1a9de5773078557a6a0bdc5a1bfd2d953c47b3e5ccc70d76dc4ba10c297d7591e2c2150b8235de09714fedcf23aedb0ec9586e52f6af6c299256ad5a0a4ce22666be48592977dc5ff5c5eea529b81df4510016240b8fc8489bf59c899bb75481220554d0b9aebf1660cb72b01dfc3ffaac27dc1d36247e86339c6d99fc3ca8edf585fdb236ecdffda1b99819f873367ee5d8fde5d596517f895c9154deab01ca26008edbeadecfe33cae750ff044469a1b3b104b35af0c04a35a48aecf54dd8844b598432b81f67ce232ad46a247cad103274cd7c206d890008b149aaa3310f9794243cc5e04d4bd3e66a5b01ef67044412eba507a20399856cd26fb6233ebc064aa7b5ba94198bc05301dd74d6875b6d3b4731c2a11f0656767a3e6ba0a3d6951a7f9385ff99876891b8150ac5257756ef92a6c3854ccba8f13bca3cd3e66fdc93feefc44c3eba570970e0a6921f1eef24713ed5a174b8e52a0bc1bd3b420bdd0e521835289d29267fca4512caeaf64d1adeba2457864801d30d37e4eea965f8cfdb314f62307d8a12084a65da330f800862cae3876cdffe8c77d982ce9527b069628f0d796c0ec1c1b423ab6eb248e176a9b201d4de572f7901d8d88ae3dc6c3f196a4e3fb81552f16f7a7b7b3a242824b0618a855fc150fe8d484c80b3e1ea6c42f165dcfa7b0b292f9c7f27179d32260d4f472385a8818f7d76133030cf1256153b4162c8c3a3629c01e9b8cb5a30b3d0068d7f0e3727d8159739386511746fad1cfcc98c7af05b489876432957c6d59c51f12ebb62acac90311e6b00cea58b355db5a36718dfb8140d23e64e41ef9d33969cae75ea3ef8f14ad8c9b2d0c8bd7bf4366b091b5992ffbd71800495c0484cbee4b5fffaede0808cdcfa2409227e6b96dd82481d6d00bfff72c29f860b7fa4fa9c3634d9a2e4f7a8ef240c997b749e0562514d5c2c5d66da75149dea37b1cbb347fa0df5be2b9a5ddf20a6d47936b3b55cedc64453e69413a89c8a9eaeda00fccc96281b4f29db0f3e45fa098c77ffe3c0488529ecfa801cdf7fe8a23f6a3aa04acaf4e300c44e6d873f43b9fd4b13cbed2411c97378e07c7a6799d272d36ac8964233130947ed88f727915fa58a4812ceacd6cc6a52bc7fcba5e57543e93d293d5a428c73b194f33ba752b0ebeb0262423e7a8f490707a220857f44e191304cffb93cfc75b217ca306292549c8742fe3aa62a464d40c666115015201c0fef3e9555615f91c3d15b6e1556a9b04febc2ae7e3d689ca5f58b51f2717ae8c5153f2c2a4df11ea8cafcc369327c2a0a6f7946daf09be323d59e4b0e42ebcdeca373a6d70a3286382f1405b7107af899da00dbd52324657870bd18ca26f3ef47e0e81cd335c827512e88f24202836e7a1b505f0d03a23d577430d971458a11ff42e36b2d2883b664d402eb7497a90ba1f94829b6d9c6b4c4f7e9dc49882520a6fd2590cb8b41328541b9076e43f6019c3da9084e57960478c268f4215bb98455fbd2981e7e37caf7aaf9008f87cfe196da930637c55da5a34e142a433494e6f92a5985d7e6fc0ec68d2ad25144919af6dc81afc88cd05f01b401730bccc3086c9dd06d38ed522e52e7ffae7671898fb91cec0821c061aaea6c47ae877d2d7f5ca1ecf159e0ea152ce713f652c116f62e12cad293331db922a5fed311ab22096d90fc17ccc53f84d46eae680def0b9949e0d9debff263d575e590941a5ce0b33548beb6dbc01104f6054da73cc349625adece6a54e092d8d740915b91d81df30374a78693d6b69724f05354d61ac0febff4a544b88954d11d3f4927895edf6ad755313227ac87f24f12d70a831df16bd45c4a03570fdf27d698fa5581fce2d002890a3f2059a6bfdf77f0aeee3ad8318449bc1b2d486b225b148a78e921c73a2c37256dfb1ad611e410d5436e0d31d00ab5177da7915a74ef3307927c23c764f5cf62c3e2db86284c9abb39045b625d507f5c8d440557b4dad2a39593fbb572cce25a364aae44134fdd97ef0148690881bee42b6bd929f12cdf07996597a2a8366b12841f8fb8dfc0ece651756637b95c6bdb92320302805b4a700e7d3dfb0b8878862f400f8437a6c153b5fab40d30af07e73cf4345cb6fa81574018a7bc0e8789fae8b8560f4b93d413fa8e0e0218527ccb82873fc9da6cc34b6197c1d8bd9223ab7c4efb1f8cf021450037f4576934d83116655c120062fc3b912176fd395ccc792d492f2730465f8b4c68155b6ceb52e80742d2970e24004171f4685cd78467a4e943a0fecff66dffff10922d69236460dc37c1df9b19dded1ecb932dd8dd2045d2f8e8d3dfb6a83a65d6623553a2aed7a12b78effeeaa58eec84cdefc84923177afb7bd04f6fc3d3332d63ed5c5d6fe8820b9853e7615407eb23962f5232db44bc0267e7f07e47b158de0732a974b80aeb00ffeeca83d26fe21e487ea4472cd9048f942155784af8f68006cdb4286480a7ffa1ba6e93fe7fdb33283359d28bf9311dee59899e0e77aa113fadda21526c8e2bd60f21e182b735a5b0177fb95e948857c6c4ae391b2b4950a35b129e7bf25b7eb2c0857290c55f5d28b78ca1f39f0cd676610805b0a378647ae958182b26de1ddbf80e80d7ab1d2476086ed192e98bee0969bc0e8765278cb5570ccc29ac6d7298821bff4f85895deffcf4ce54a69878cfb41eade0d8703cbcff02352733ace2d800ba68b0fdcc52b94247ecacddf80ad228cf76eb547d276d0f6402054e34c3569e2b53ea3cbc54e49e099372cde3acd1ba47f836a765f855763a175a58ec4d6cecc72375da2d8c956c2868e77bfdb697182b554f0b743d7095cf13a3ba1d19e7590c281bd09ce235898a9682aacb5633b4fa4c3bdd71139c20c518b6a7651a47df7658a5a7ed41b3e7e43543d68c1dd4a5d01ec7e42cabdd6963db84f0d69b5a471ff8b929a8774baee39b14ab325af2ea7756c656c0135a59568499208341333d6b896cf0cc10108970e20313df241d179bd2a4d2392b269e6aeb9d2570bba7e3c67f49e90cf95562f93077a5fb588225724d444fcd8da55921dcff7b0be49ac0171ae98209e729f65bcebe447ccc0a185719f3fd55d1ae263daac4a420da91d05cdfc85d48e5743483dbb6fe81e5c216948953d95d5e725db17df44f05a57c6cc425e55572f9163e536a6d2d51d5213c937f6ddba08fc1f90ec73088a766a685f2c0d43b80422d48eef23b2ea588ea26b8dffb4f0df0cf91d6ea8f14a663ba2b165e4427010742fe63905d62b9dcf2385dce09fe75e4746d5c9c402ee77bfc9f39a28eb9f2751a81b090a499706accafbf5ae1afa9af350fd7481bb", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000000000), 0x2008000fffffffd) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x0, {}, {0x2, 0x0, @multicast1}, {}, 0x2a0}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={0x0, {}, {0x2, 0x0, @empty}, {}, 0xab852ebbeefbd631}) creat(&(0x7f0000000080)='./file0\x00', 0x0) 23:23:29 executing program 3: mknod(&(0x7f0000000000)='./file0\x00', 0x8448, 0xffffffff) syslog(0x3, &(0x7f0000000240), 0x21d) 23:23:29 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf51", 0xd6, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:29 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x0, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:29 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000000)=0xe8) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000001c0), 0x4) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000200)=""/2) socket$inet_icmp_raw(0x2, 0x3, 0x1) 23:23:30 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527", 0xdd, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b40000000000000085000900020000009502000000000000"], &(0x7f0000000200)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 23:23:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000100)=[@mss={0x2, 0x5}, @window={0x3, 0x7fffffff, 0xabb2}, @sack_perm], 0x20000000000002fa) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fchdir(r1) r3 = gettid() setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @local}}}, 0x88) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0xffff}, 0x28, 0x2) ptrace$setopts(0x4200, r3, 0x5, 0x20) tkill(r3, 0x5) fcntl$setstatus(r2, 0x4, 0x42803) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000140)={'broute\x00'}, &(0x7f00000001c0)=0x78) 23:23:30 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000080)) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:30 executing program 1: r0 = socket(0x8, 0x4000000000080002, 0xb) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x0, 0x8000}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$KDSKBSENT(r6, 0x4b49, &(0x7f0000000080)) 23:23:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000100)=""/50, &(0x7f0000000140)=0x32) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000414900000904fcff", 0x58}], 0x1) 23:23:30 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527", 0xdd, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r3 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) getxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='system.advise\x00', &(0x7f0000000680)=""/68, 0x44) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x5}, [{0x2, 0x6, r1}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x2, r4}, {0x2, 0x2, r5}], {}, [{0x8, 0x4, r6}], {0x10, 0x4}, {0x20, 0x4}}, 0x54, 0x3) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x19) r7 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r7, 0x2, &(0x7f0000000700)) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 23:23:30 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527", 0xdd, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:30 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x0, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:30 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9a", 0xe1, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:30 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9a", 0xe1, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:30 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) listen(r6, 0xfff) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x4, 0x95, 0x7}}, 0x28) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:30 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9a", 0xe1, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 5: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9a", 0xe1, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:31 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e5", 0xe3, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r3 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) getxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='system.advise\x00', &(0x7f0000000680)=""/68, 0x44) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000580)={{}, {0x1, 0x5}, [{0x2, 0x6, r1}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x2, r4}, {0x2, 0x2, r5}], {}, [{0x8, 0x4, r6}], {0x10, 0x4}, {0x20, 0x4}}, 0x54, 0x3) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x19) r7 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r7, 0x2, &(0x7f0000000700)) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 23:23:31 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:31 executing program 5: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527", 0xdd, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e5", 0xe3, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e5", 0xe3, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) exit_group(0x20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) fchdir(r4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:31 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:31 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) signalfd4(r6, &(0x7f0000000080), 0x8, 0x80000) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:31 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:32 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800008}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="45d68e9d4e00", @ANYRES16=r4, @ANYBLOB="200427bd7000fcdbdf25010000002c00030008000800040000000800030003000000080008000200000008000300000000000800080008000000080005000100000008000600070000000800040005000000"], 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x8890) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x20, @empty, 0xff}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000880)="d6a758d87881ee4ac9938e438707c7eeba83d49e697bc5491658c26fbbf0e70b740eddcb7a981f842a682c2fe970a3b65571e0e15d31985c8113d9419816fada032277657938bc45c22430311f9fdb04327827c796e480ad63ef996ade99ea14fd2d83febfa3f216c192011a0e37e25ce0c63f34494834df78d3ad0fbdc56eee1f7d74a5328708f2010b5f2dfa11ed68153f4445f7ab1638a45a7d9bde8f7872599d6712a7671914774b578b40545c1b13188c6ed53a5901f6bd3e", 0xbb}], 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, 0x0) listen(r0, 0x26fd3f89) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) memfd_create(&(0x7f0000000380)='syz1\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x8002, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000240)={0x2c4}, 0x7) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}, 0x80000}, 0x1c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(r2) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x42400) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$selinux_context(r5, &(0x7f0000000000)='system_u:object_r:system_map_t:s0\x00', 0x22) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='bbr\x00', 0x666411a93b62a9a0) r6 = socket$netlink(0x10, 0x3, 0x6) writev(r6, &(0x7f0000e11ff0)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fffffe181004e22000075a9bdee0521d283945f64009400050028925aa8000000000000ff7f00f0fffeffe809000000fff5dd001b2f0f000100070abd00000078b75bff3ec6", 0x58}], 0x1) write(0xffffffffffffffff, &(0x7f00000002c0)="bc1b3c6572c2ac8fd88039f56e55", 0xe) ioctl$int_out(r1, 0x80000, &(0x7f0000000300)) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) write(r4, &(0x7f0000000440)="b2cf791ae07fcba019ebbd2764b345fa475d494fbe60cf259fd297b6a2fdd1ea01970074f98d272cf8d666abb43192f5914c3a073006000022f5fffb76de823d144210000000", 0x46) select(0x40, &(0x7f0000000040), &(0x7f0000000400), &(0x7f00000001c0), &(0x7f0000000280)={0x77359400}) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0xfffffffffffffffe, 0xffff, @ipv4={[], [], @empty}}, 0x317) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) listen(r4, 0xffffffffffffffff) open(&(0x7f00000005c0)='./bus\x00', 0x200, 0x0) r7 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x2fd) 23:23:32 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:32 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:32 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 1889.508966] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:23:32 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="64eaff00", @ANYRES16=r6, @ANYBLOB="060028bd7000fcdbdf25060000001c00090008000200020000000800020007000000080001002000000034000900080001000000000008000100090000000800010005000000080002000300000008000200bf7e000008000100e20f0000"], 0x64}}, 0x10) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) write$selinux_validatetrans(r3, &(0x7f0000000140)={'system_u:object_r:semanage_read_lock_t:s0', 0x20, 'system_u:object_r:crash_device_t:s0', 0x20, 0x8000, 0x20, '/usr/sbin/cupsd\x00'}, 0x73) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:32 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:32 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:32 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, 0x0, 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:32 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:33 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xffffffffffffffb5}, 0xfffffeba) ioctl$TIOCLINUX2(r2, 0x541c, &(0x7f0000000080)={0x2, 0x9, 0x1, 0x4, 0x4, 0x8f5}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000240)={0x7, 0x4, 0x1, 0x1, 0x13, 0x7, 0x1, 0x200, 0x5, 0x400, 0x1, 0x1}) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000280)={0x5, 0x64, 0x80, 0x0, 0xd, 0x80000001, 0xfff, 0xddb, 0x2, 0xd31b}) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000001c0)=""/81) 23:23:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x20, @empty, 0xff}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000880)="d6a758d87881ee4ac9938e438707c7eeba83d49e697bc5491658c26fbbf0e70b740eddcb7a981f842a682c2fe970a3b65571e0e15d31985c8113d9419816fada032277657938bc45c22430311f9fdb04327827c796e480ad63ef996ade99ea14fd2d83febfa3f216c192011a0e37e25ce0c63f34494834df78d3ad0fbdc56eee1f7d74a5328708f2010b5f2dfa11ed68153f4445f7ab1638a45a7d9bde8f7872599d6712a7671914774b578b40545c1b13188c6ed53a5901f6bd3e", 0xbb}], 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, 0x0) listen(r0, 0x26fd3f89) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) memfd_create(&(0x7f0000000380)='syz1\x00', 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x8002, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000240)={0x2c4}, 0x7) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @empty}, 0x80000}, 0x1c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(r2) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x42400) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$selinux_context(r5, &(0x7f0000000000)='system_u:object_r:system_map_t:s0\x00', 0x22) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='bbr\x00', 0x666411a93b62a9a0) r6 = socket$netlink(0x10, 0x3, 0x6) writev(r6, &(0x7f0000e11ff0)=[{&(0x7f0000000040)="580000001400192340834b80040d8c560a067fffffe181004e22000075a9bdee0521d283945f64009400050028925aa8000000000000ff7f00f0fffeffe809000000fff5dd001b2f0f000100070abd00000078b75bff3ec6", 0x58}], 0x1) write(0xffffffffffffffff, &(0x7f00000002c0)="bc1b3c6572c2ac8fd88039f56e55", 0xe) ioctl$int_out(r1, 0x80000, &(0x7f0000000300)) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xfffffeb3) write(r4, &(0x7f0000000440)="b2cf791ae07fcba019ebbd2764b345fa475d494fbe60cf259fd297b6a2fdd1ea01970074f98d272cf8d666abb43192f5914c3a073006000022f5fffb76de823d144210000000", 0x46) select(0x40, &(0x7f0000000040), &(0x7f0000000400), &(0x7f00000001c0), &(0x7f0000000280)={0x77359400}) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880)={0xa, 0xfffffffffffffffe, 0xffff, @ipv4={[], [], @empty}}, 0x317) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) listen(r4, 0xffffffffffffffff) open(&(0x7f00000005c0)='./bus\x00', 0x200, 0x0) r7 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x2fd) 23:23:33 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r1, 0x100, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r4, &(0x7f00000001c0), 0xfffffef3) write$9p(r4, &(0x7f00000002c0)="bf7a0ba2b8252e170694d98cf04935261592cb160d3f8410d9f94ecae430536e811ed9fa8f7d6d7e74e22ab3fc555952b96eb794349614c29ecfd78d41d8fe688a31e13a3b98fc8679075efb26195ddee351712db1cf9cffc3f17caa6cf860416534133523307927a29b1f99fb598fab0c58", 0x72) vmsplice(r3, &(0x7f0000000340), 0x1000000000000082, 0xf) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r6 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r3, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:33 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 1890.530430] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:23:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f0000000140)) socket$inet6(0xa, 0x0, 0x5) 23:23:34 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:34 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:34 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', 0x0, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) r3 = geteuid() getgroups(0x3, &(0x7f00000000c0)=[0xffffffffffffffff, 0xee01, 0xee01]) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={r2, r3, r4}, 0xc) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = openat(r5, &(0x7f0000000240)='./file0\x00', 0x40000, 0x80) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000180)={0x7}, 0x4) r7 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) dup2(r0, r7) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:23:34 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 23:23:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x200000000000019a, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x7, 0x8, r2, &(0x7f0000000740)="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", 0x0, 0x3, 0x0, 0x1, r1}]) ppoll(&(0x7f0000000080)=[{r0, 0x1400}, {r1, 0x100}, {r1}, {r0, 0x2}, {r1, 0x100}], 0x5, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)={0x2}, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:34 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 23:23:34 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = getpid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000780)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f00000005c0)=0xe8) fstat(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000940)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000540)="55fa6f3a1288fad83b1b749d29e5a3960fcd29f08ce8d64772446dec9a7ead77533d3f6f9585c272bfc1b081a0e7b5b17f87f9b0acd93b133c144d6c3d32c7568caad72964f3964f707b9c20bde1c055560a9aa9b2fdef1cbca8341e24ee", 0x5e}, {&(0x7f0000000680)="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", 0xfd}], 0x2, &(0x7f0000000900)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x20, 0x1}, 0xc800) r8 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r8, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="a8090000000015b38bf8ea2c0bc0ed20497f61000826bd7000ffdbdf2500399bee8a5c6408000000", @ANYRES32=r1, @ANYBLOB="07000f000e000500ffff0d0008000e00000800007c0008001c000100000580000000000001000000ffffff7f01000000090000000c000200ff030004010009001800020006009115060000080100010042003e00090000001c000100b2ff050000020000020000000200000001000000010000001c00010002fe00010600000001000000030000000900000001000000"], 0xa8}, 0x1, 0x0, 0x0, 0x8000}, 0x80) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r9, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040004}, 0x40800) 23:23:34 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 23:23:34 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:34 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:35 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup3(r0, r0, 0x80000) dup2(r1, r1) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'system_u:object_r:cron_log_t:s0'}, &(0x7f0000000200)='system_u:object_r:cron_log_t:s0', 0x1f, 0x1) write$selinux_create(r1, &(0x7f0000000100)=@objname={'system_u:object_r:cron_log_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x0, 0x20, './file0\x00'}, 0x4d) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000070101000000eba78864ebb61c1d00000000000000000000"], 0x14}}, 0x0) 23:23:35 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x200800, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000140)=0x9, 0x4) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) r4 = dup3(r0, r0, 0x80000) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f0000000000)={0x0, 0x4, 0x8001, 0x5}) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:35 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x8) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:35 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:37 executing program 3: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000001900)='./file0\x00', 0x4000, 0x20) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x2000001, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) clock_gettime(0x0, &(0x7f0000005d40)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000005b00)=[{{&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/6, 0x6}, {&(0x7f0000000140)=""/69, 0x45}, {&(0x7f00000001c0)=""/115, 0x73}], 0x3, &(0x7f0000000280)=""/50, 0x12}, 0xa24}, {{&(0x7f00000002c0)=@ax25={{0x3, @netrom}, [@remote, @bcast, @rose, @rose, @remote, @rose, @null, @rose]}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000000400)=""/107, 0x6b}, {&(0x7f0000000480)=""/10, 0xa}, {&(0x7f00000004c0)=""/60, 0x3c}], 0x4}, 0xffffffff}, {{&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/7, 0x7}], 0x1}, 0x279791e5}, {{&(0x7f0000000640)=@isdn, 0x80, &(0x7f0000000740)=[{&(0x7f00000006c0)=""/42, 0x2a}, {&(0x7f0000005e00)=""/39, 0x27}], 0x2}, 0x3}, {{&(0x7f0000000780)=@ipx, 0x80, &(0x7f0000001800)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1, &(0x7f0000001840)=""/4, 0x4}, 0x3f}, {{&(0x7f0000001880)=@in6, 0x80, &(0x7f0000001f40)=[{&(0x7f0000005e80)=""/142, 0x8e}, {&(0x7f00000019c0)=""/87, 0x57}, {&(0x7f0000001a40)=""/236, 0xec}, {&(0x7f0000001b40)=""/96, 0x60}, {&(0x7f0000001bc0)=""/237, 0xed}, {&(0x7f0000005dc0)=""/57, 0x39}, {&(0x7f0000001d00)=""/205, 0xcd}, {&(0x7f0000001e00)=""/149, 0x202}, {&(0x7f0000001ec0)=""/97, 0x61}], 0x9, &(0x7f0000002000)=""/152, 0x98}, 0xdf34}, {{&(0x7f00000020c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f00000041c0)=[{&(0x7f0000002140)=""/100, 0x64}, {&(0x7f00000021c0)=""/4096, 0x1000}, {&(0x7f00000031c0)=""/4096, 0x1000}], 0x3, &(0x7f0000005e40)=""/30, 0x1e}, 0x8001}, {{&(0x7f0000004240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000004300)=[{&(0x7f00000042c0)=""/29, 0x1d}], 0x1}, 0x1}, {{0x0, 0x0, &(0x7f00000059c0)=[{&(0x7f0000004340)=""/173, 0xad}, {&(0x7f0000004400)=""/115, 0x73}, {&(0x7f0000004480)=""/194, 0xc2}, {&(0x7f0000004580)=""/188, 0xbc}, {&(0x7f0000004640)=""/242, 0xf2}, {&(0x7f0000004740)=""/253, 0xfd}, {&(0x7f0000004840)=""/78, 0x4e}, {&(0x7f00000048c0)=""/192, 0xc0}, {&(0x7f0000004980)=""/35, 0x23}, {&(0x7f00000049c0)=""/4096, 0x1000}], 0xa, &(0x7f0000005a80)=""/107, 0x6b}, 0x3}], 0x9, 0x40000123, &(0x7f0000005d80)={r2, r3+30000000}) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r0, r1, 0x0, 0x10001) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") recvmmsg(r0, &(0x7f000000a100)=[{{&(0x7f0000009f40)=@can, 0x80, 0x0}}], 0x1, 0x2001, 0x0) 23:23:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz1\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r3, 0x4, 0x4001) fsetxattr(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="86797374656d2e567267427b70726f634300e2c0f42c0353e471450017c30ac5fd244878c81ae9d8ea7ecbfc14c52efb0c766e63f167007da2f6802b7d7fbba29f95a09c4a72f64132cc378febb2f43353333c5c34680bb31eb670396b7a"], &(0x7f00000002c0)='\'ppp1wlan0\x00', 0xb, 0x0) io_setup(0xb, &(0x7f0000000100)=0x0) getsockname$unix(r3, &(0x7f00000001c0)=@abs, &(0x7f0000000080)=0x6e) io_submit(r4, 0x6, &(0x7f0000002740)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x81, r2, &(0x7f0000000040)="fcd484dbeb01c019a63953df6679d3ba4a80da88987c47e1f22095df7d7aa32c068156c077c604e00a78734bbfedbf1c71481e4bb43e96a277f6c9", 0x3b, 0x0, 0x0, 0xf75b0befe666f251, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff7, r0, &(0x7f00000003c0)="6644859641e8b8746df97329db7f4a2d9b1ae7889c40d756446a23f39a8b41fcab35c401150e1e970949f2509d208f2081eb2c16712759e38e1def2d87f9ed4595eab8ea52414a6445f72ef302", 0x4d, 0x10001, 0x0, 0x1, r1}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x3, 0xffffffffffffffa9, r3, &(0x7f0000000580)="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", 0x1000, 0x6, 0x0, 0x2, r1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0x1000, r3, &(0x7f0000001580)="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", 0x1000, 0x400, 0x0, 0x2, r1}, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x40, r1, &(0x7f0000002580)="b149f438429e12c68e0780283c389e7415e79efc4c3e8bf9996635ac34dd2a450e04155e54d8ebe92240ec742dee97f51e0a21bd649822b05a8084c141172deddf5da929dc0e7de2d354d8a610906969f51e915de09639552e0d499f9da2f8e86bdfff6ed54a5a1f7ed432319d01d20540b4b4f4833d94aeff4b732ae9ad0c9ae9af81120633772a4e95071249454537338ab52bfda85504c645eef4c39dcb268aa0bd3bb046267c23c648730c4351401f0b4abe1d2bc73304a6974ce6ac", 0xbe, 0x2, 0x0, 0x2, r0}, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000002680)="4a68bd149d68d3d4c6f0d276ef3e44657610da607765d58a4986fb8fd99d4111c5a3087265e0b272b505b61baf59807940c12660c52be221bf94fa75decc49c4c17b78feccb599a00d012a4722a927", 0x4f, 0x1ff, 0x0, 0x3}]) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:37 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:37 executing program 5: write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x4}], 0x18) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x8012, r3, 0x0) 23:23:37 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) socket$inet6(0xa, 0x2, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r5, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:37 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x16) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x0, 0x20008000) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) ioctl$KDDELIO(r2, 0x4b35, 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x20202, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:37 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x11, 0x80005, 0x8001, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0x180) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000480)=0x8) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x3c, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0xbd}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000003c0)) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:37 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000580)='oom_adj\x00') read(r1, &(0x7f00000003c0)=""/128, 0x100f3) add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$int_in(r2, 0x5473, &(0x7f0000000080)=0x80000000) 23:23:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) [ 1894.716220] input: syz1 as /devices/virtual/input/input155 [ 1894.795340] input: syz1 as /devices/virtual/input/input156 23:23:37 executing program 0: mkdir(&(0x7f0000000940)='./file0\x00', 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) keyctl$chown(0x4, r2, r3, r5) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x10000, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) sched_setaffinity(r4, 0x8, &(0x7f00000003c0)=0x2) r6 = accept4(r0, &(0x7f0000000400)=@x25, &(0x7f0000000480)=0x80, 0x80800) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x101000}, 0xc, &(0x7f0000000640)={&(0x7f0000000700)={0x1c4, r7, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6978}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcff}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff801}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x37}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f71}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xedd1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffe01}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0xf9857b39ce753895}, 0x200080c0) 23:23:37 executing program 3: syz_open_dev$loop(0x0, 0x0, 0x80) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet(0x2, 0xa, 0x3) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c40)={'veth0\x00', r3}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendmsg$unix(r1, &(0x7f00000004c0)={&(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0xfffffffffffffdde}, 0x90) sendfile(r4, r4, &(0x7f00000003c0), 0x2008000fffffffe) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080), 0x4) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1000000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r1, 0x0, 0x6, &(0x7f0000000200)='veth0\x00', 0xffffffffffffffff}, 0x30) r6 = getpgid(r5) ptrace(0x200000000003, r6) creat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000001340)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140)=0x7f, 0x4) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) 23:23:37 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0xc0, r2, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x306}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="461e9fa5dd354c00d87f950cf67ac696"}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x2}}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x104c0000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb88}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key(&(0x7f0000000400)='cifs.spnego\x00', &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0xfffffffffffff000, &(0x7f0000000240)=0x0) io_getevents(r3, 0x1, 0x1, &(0x7f0000000280)=[{}], 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffed9}, 0xfffffffffffffc9e) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000001c0)=""/118) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000200)=""/174) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000001c0)={0x9, &(0x7f0000000140)=[{0x1000, 0x800}, {0x7}, {0x100000000, 0x5}, {0xffffffff, 0xde}, {0x7fffffff, 0x7}, {0x6, 0x6}, {0x69b65d58, 0x1}, {0x7, 0x564}, {0x1, 0x8fd}]}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x4}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f00000002c0)={0x90000000}) 23:23:38 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) r3 = fcntl$getown(r1, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r3) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:38 executing program 5: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0xc0, r2, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x306}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100000000}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="461e9fa5dd354c00d87f950cf67ac696"}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x2}}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x104c0000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb88}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x40}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key(&(0x7f0000000400)='cifs.spnego\x00', &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20}, 0x20) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0x100f, &(0x7f0000000240)=0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0xe84e, &(0x7f0000000080)='batadv0\x00', 0x7, 0x0, 0x6}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:38 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) socket$inet6(0xa, 0x2, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r5, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:38 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000180)='ip6_vti0\x00', 0x9, 0x3) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:38 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) fadvise64(r1, 0x0, 0x5, 0x5) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r0, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) setns(r1, 0x2a000000) 23:23:38 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000700)=@routing={0x0, 0x6, 0x0, 0x0, 0x0, [@mcast1, @loopback, @mcast1]}, 0x38) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000000400)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000015) ioctl$RTC_WIE_ON(r0, 0x700f) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:39 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000040)=0x4, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000004c0)='lo\x00', 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x2000, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000180)={0x3f, 0x80000001, 0x90}) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000500)='IPVS\x00', 0x5, 0x1) r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="080000026d2427000a004e2000004000fe8000000000000000000000000000aaff000000000000000000000000000000000000000000000000000000000000000000008668cb97dcca8a92ca2700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000050000000a00000000000000fe88000000f8ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe6000000000000000000000000000000000000000000000000000000000000a004e23000000380000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2100000002000000008000000000000000000000003a060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22fffffffffe8000000000000000000000000000bb07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000080000000000000000000000000a004e20000000020000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x310) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180), 0xf8, 0x4007ffd, 0x0, 0xb4) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 23:23:39 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) io_getevents(r3, 0x1, 0x1, &(0x7f0000000280)=[{}], 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffed9}, 0xfffffffffffffc9e) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000001c0)=""/118) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:39 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x100, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:39 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) socket$inet6(0xa, 0x2, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r5, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:39 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) setxattr$security_capability(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x1, 0x52a}, {0x74, 0x8}]}, 0x14, 0x2) r2 = fcntl$dupfd(r0, 0x0, r0) shutdown(r2, 0x0) connect$unix(r0, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = accept(r1, &(0x7f00004e4000)=@hci, &(0x7f00003e9ffc)=0x6) sendto$inet6(r3, &(0x7f0000bb5000)="ce", 0x1, 0xc840, 0x0, 0x0) 23:23:39 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1\x19\x14\x1be\x95\xcd\xfa\xbdsr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) syncfs(r0) setns(0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x11, 0x0, &(0x7f0000000040)) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:39 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) sendmsg$netlink(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)={0xf4, 0x41, 0x200, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x4, 0x38}, @typed={0x8, 0x27, @ipv4=@broadcast}, @typed={0x14, 0x22, @ipv6=@rand_addr="fa7ebcb9323acd598c7ce2d100835ab0"}, @typed={0x8, 0x35, @u32=0xe5e5}, @nested={0xc, 0x3d, [@typed={0x8, 0x0, @ipv4=@remote}]}, @typed={0x8, 0x17, @pid=r1}, @generic="4fad337f6441125bca844ab266737c40750ed6af6fd3a445c1a2ead2b64fd88fef23e86aba39f7b2be15e7d4aabfebbd3831c51e969d2b02a3769aec5acdc7e620d5fc671be33a119142fabc330be7efa732bd4d42ad77dcdb706870ae5cbd5be02d1d41c2bacaec2e0fefacf42e37019f1f2eff5ca81e4405142fae6b5c6484912a1331f3f0306198c0ed66597019e2df41495b281b9b0e61baf9d40e027a92feb49232da1e8d65"]}, 0xf4}], 0x1, &(0x7f00000002c0)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0x28}, 0x40000) 23:23:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x80000, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x2050, r2, 0x0) 23:23:39 executing program 3: getpgid(0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x19c04826) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000340)) socket$inet6(0xa, 0x0, 0xc270) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(r0, 0x540c) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4e}, 0xd4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB="09509ed3499be20900000000e637000008001f0003000000252bc9ae204a4682300000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20000800}, 0x40005) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000000c0)=@routing={0x1d, 0x2, 0x3, 0x6, 0x0, [@mcast2]}, 0x18) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000000000c387b6200000000000000"], 0x0, 0x1a}, 0x20) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x0, &(0x7f0000000000), 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getrusage(0x0, &(0x7f0000001280)) sendto$inet6(r5, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) init_module(&(0x7f0000000400)='\x00', 0xfff30, &(0x7f0000000180)='\x00') setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="00001220000000000000000000000000df4be4464df01dfbcfda4b2f5ad31d7e6423fda756d6f5ecb6dc6b4cd3a287273ba2519fce4331c096fdfd81adec7238a6e9ae086c7754c3dbfc36fa629b99e5f3d19e9a69a8524fa710cb4929d3263529441245506606925019aad6ed792e66ef5f8e89d8093774f1a0369601107fa88ad1d02313fa45d4b6844c2daf5d28f331c313d958e18ce1db561cdff6e7be4cf28b0cecd7a853b20d68e4d2984634b4ada2a4847ba2a4445fa3fb6033a3964cf8926900009a9c9128a0dd60cb7cd154064424e0094abf52faea7c403becab0fb740910aa93e41d20482"], 0x8) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x5) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x45) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='veth0_to_bond\x00') 23:23:39 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000002c0)=""/213, &(0x7f0000000080)=0xd5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000140)={0x7a}, &(0x7f0000000180), &(0x7f0000000240), 0x8) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) sendto(r0, &(0x7f0000000480)="15f58efb289894c8dddea21398e05d32efd6bbc6bcce371d2386134c3d1d3ba9a1da4892657b002cd440e72dd2a5bc84660fa22b5bb8acd5b08140942bb86f764a9bc9c33d34642e154fbed566ea17d61e06b4d4394c792a97343824b5b6e59707c21d4832a2d92cb65f1aa85bd3ad87deebb7640e2a6cfdb9520b1678b0f120a7a7ebf158f9d27eaf85694324be4aa84078d806a3f98270b364e7a3a8fb0be89b0d0f7de9eab1a1d6f041a232c8eaa4bc1db06d5c6d16d5be2b5e765a7057adc71a", 0xc2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000400)={0x0, 0x0, {0x1c, 0x8, 0x15, 0x1c, 0x5, 0xa826, 0x1, 0x33, 0xffffffffffffffff}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, r6, 0x0, 0x1d, &(0x7f0000000580)='usersecurityvmnet0mime_type&\x00', 0xffffffffffffffff}, 0x30) sched_getscheduler(r7) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)=0x3) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:39 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:40 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x6) 23:23:40 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, {0x306, @broadcast}, 0x4, {0x2, 0x4e22, @loopback}, 'rose0\x00'}) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:40 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x14, 0x0, 0x8, 0x800000001}, 0xb8}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000800)={0x1b4, r2, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x81, @ipv4={[], [], @rand_addr=0x9}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf33f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd4a}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x1}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x13) fchdir(r3) creat(&(0x7f00000004c0)='./bus\x00', 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x20) setsockopt$inet6_int(r5, 0x29, 0x0, &(0x7f0000000600)=0xcb, 0x4) chroot(&(0x7f00000001c0)='./bus\x00') r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000640)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) sendmsg(r7, &(0x7f0000000580)={&(0x7f0000000280)=@in={0x2, 0x4e23, @multicast1}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)="229adb77e2b5f92d4a43f04d6eb3461585c5a4978b66b62a3afcc5bb8f3f86b00dfb9b2e1868022f01314bec", 0x2c}, {0x0}], 0x2}, 0x40440c4) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r6, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r8, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000000301ffff000000000000000000000000af2c0987d1554b0000000000000fffb94fc62444048c9212bf9912b3c89422497319d18afe6e3fa68e364de3ebb5bc54be2eebf2b2420080a70167c8824ac1686e2765e406e748607152395ecc22b9c09680039d1db60c0b50b5f864d96805e5e45c109345318c000000000000"], 0x71}}, 0x0) 23:23:40 executing program 3: getpgid(0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x19c04826) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000340)) socket$inet6(0xa, 0x0, 0xc270) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCEXCL(r0, 0x540c) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4e}, 0xd4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)=ANY=[@ANYBLOB="09509ed3499be20900000000e637000008001f0003000000252bc9ae204a4682300000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x20000800}, 0x40005) setsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000000c0)=@routing={0x1d, 0x2, 0x3, 0x6, 0x0, [@mcast2]}, 0x18) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000000000c387b6200000000000000"], 0x0, 0x1a}, 0x20) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x0, &(0x7f0000000000), 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getrusage(0x0, &(0x7f0000001280)) sendto$inet6(r5, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) init_module(&(0x7f0000000400)='\x00', 0xfff30, &(0x7f0000000180)='\x00') setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="00001220000000000000000000000000df4be4464df01dfbcfda4b2f5ad31d7e6423fda756d6f5ecb6dc6b4cd3a287273ba2519fce4331c096fdfd81adec7238a6e9ae086c7754c3dbfc36fa629b99e5f3d19e9a69a8524fa710cb4929d3263529441245506606925019aad6ed792e66ef5f8e89d8093774f1a0369601107fa88ad1d02313fa45d4b6844c2daf5d28f331c313d958e18ce1db561cdff6e7be4cf28b0cecd7a853b20d68e4d2984634b4ada2a4847ba2a4445fa3fb6033a3964cf8926900009a9c9128a0dd60cb7cd154064424e0094abf52faea7c403becab0fb740910aa93e41d20482"], 0x8) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x5) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x45) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='veth0_to_bond\x00') 23:23:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x1000000003fff) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:40 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', r2) 23:23:41 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/pid_for_children\x00') setns(r3, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000000)='Kppp1-)\x00', &(0x7f0000000100)) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$get_persistent(0x16, r4, r5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:41 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x18d680, 0x0) setns(r2, 0x8020000) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:41 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = geteuid() pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f0000000380)={'broute\x00'}, &(0x7f0000000400)=0x78) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000300)) chown(&(0x7f0000000000)='./file0\x00', r2, r4) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:41 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:41 executing program 3: openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x101000, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x80000000001, 0xc, 0x2009, 0x20000000000001, 0x800000000000001, r0, 0x3a}, 0xffffffffffffff78) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000)="3792617ceedfcb1f91bc9bfc2fb7b938a550a583286b1a1e7da89d26d1d9a11679c123fa49e716bd534d2e193e95914b0e8a52be814fad0b", &(0x7f0000000040)="bd3a2451d0b606e205eb54bfe13d47f3dda17faae672bc0e4e2bce0a43c99b694c313025ab1d86a8"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x18) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffffffffff3b, 0x9, 0x0, 0x4, 0xa, 0x4, "e1fde0304a3f22ff9d2594999b033840518186c721be6f72d91383b303600a0df39187d11469217c3c73b258387561dfa607b5f5f141a589e2e64dce87f31e54", "07d0efb9702ce55dde7a3a82d3b6c48d0d2576112bb7484b3281d7e889c90ecb178ac28971b5185788ae04ba1c11b8cfadd3059081e2998f9d8508971da723dd", "ee3c11647141c57c513d48b1fa04083a57166b229187d42ea65909f8e0e926a4", [0x20, 0x9]}) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x25dfdbfd, 0x4000}, 0xc) 23:23:41 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) pipe(&(0x7f0000000080)={0xffffffffffffffff}) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) r13 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000800)=0xe8) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000840)={{}, {0x1, 0x7}, [{0x2, 0x2, r8}, {0x2, 0x7, r9}, {0x2, 0x1, r10}, {0x2, 0x1, r11}, {0x2, 0x1, r12}, {0x2, 0x2, r13}, {0x2, 0x0, r14}], {0x4, 0x4}, [], {0x10, 0x2}, {0x20, 0x2}}, 0x5c, 0x2) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:41 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setown(r1, 0x8, r3) keyctl$assume_authority(0x10, r2) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwritev(r4, &(0x7f0000000640)=[{&(0x7f0000000300)="4a26f291a560eaea1a03594014890d7dd4372b16e3bf8618c663394fbe64e630d5bf41456ccc75b7ba2169d1cdc6b6aabf413591609c10910fafcabe049711a4b0609ac1b62ea32c984302a8e9d64b281f2f5a27aaef2afd4f9e70efd5cd244bb429e3019b6d8ec0f505cd5ddcd74253bd4f6bc9a6aff30640b3a1278aaa7ad818d9f4fac5f1e80a5319d7546cb3bf", 0x8f}, {&(0x7f00000003c0)="597ee65ea3d85a3adcc39c0481efb2a0b67e2a58fb960494acd4100e8fc741c5c6e9ae7576e816586f2dce14638e7378d2c25d85373c8e30dff4d59f23afaa3be45d1a50aa10d0e1140e5918fdcf6b10a229011d097b9aa724da2581043b457d24cef2897644aa8e3601d634839b03e5758a28512c4b643b4899a683d0ae6a", 0x7f}, {&(0x7f0000000440)="c5bea37ef43e70e6b3c176b6e31e455c0365e42b6e9bba238f6389fd6f5dcacc1c6d4ec784693d6a000ed8dc71051ce33faee69c7aadff94686d42c88e0d49ec1b8efa00e07f5c988d834b92c3eef5116012e263e94fdff25a26caa629a2a12f6780c0f339193c698baaf2de27925f628ebd4538b642b5ab8f44462bd2353c25f718dacf4b8c4954e9599beb9df96ccc138dd92b231e92", 0x97}, {&(0x7f0000000140)}, {&(0x7f0000000700)="464e003feb1724acaec092449b0817ee53a8015d78e85e9b955ca9772d0958d35d2dfcf226e3b8343152d45be60ade2916afde6d37251ac722ded1770b683bfe56b117cf7bd0744798a7fc1bcc82a103bb116dbb4c1cc3683099873514e4b310027b9668ad8359d698dfb34edb9a172ec35df398b5aafcdb937f74c81e97b95f4f98046c475cc74f7c682bbc33d974cbc416bf1b7b0004ef75c09b89cbe282964f1892de6d17afc2a211f8048bfd8dee809eef4d0578150339c071229a0120caef05d9d0e72aa8c6229e9d574157a0666be70efcdd387a15a2eb0a2f4255b11f5d24c0ff9f4e55e78001b942a1e8f78b6cf7", 0xf2}], 0x5, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:41 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000580)) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000900)) getuid() mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000280)='fuseblk\x00', 0x4000, &(0x7f0000000940)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@blksize={'blksize'}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}], [{@uid_lt={'uid<'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x1) signalfd(0xffffffffffffffff, &(0x7f0000000000)={0xfff}, 0x8) lseek(r1, 0x0, 0x2) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) getgroups(0x1, &(0x7f00000004c0)=[0xee01]) sendfile(r1, r2, 0x0, 0xa5cc54d) creat(&(0x7f0000000500)='./bus\x00', 0x12) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r3, 0x1, 0x10000000000032, &(0x7f0000000040), 0x30ea8ccf2eb97d03) timer_create(0x0, &(0x7f00000011c0)={0x0, 0x6, 0x4, @thr={&(0x7f00000000c0)="5306f5d49d5dba937e3d2f96f7ba4b0716b18dd2efc49da24169f43c96646ce4e8cd7e598a9c200c75a5ac53e1c1d58ac5e58e1538492ac7fcc6ac42b5b69ccc52166c36824c4ec724b851502acd065c90df354a02b04f6dc18cdc79f8f818c854b55767240463e767c96de105b90cdce45090296b7aa856f74725813e721fc4e5585e7d7eabfbafde72363abe40297f2411bda0e431abd70e9329fafd21a1e2ccda661e27b800b492f36a29eba7687d0441c7ffe3f72319d89248d8f68ae99663a4c52b2269db10434efbe95d1020112d", &(0x7f00000001c0)="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"}}, &(0x7f0000001200)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x48400, 0x0) ioctl$TIOCMSET(r4, 0x5418, &(0x7f0000000080)=0x3) [ 1899.058720] audit: type=1400 audit(1552605821.915:325): avc: denied { write } for pid=17396 comm="syz-executor.5" name="net" dev="proc" ino=270041 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 1899.348552] audit: type=1400 audit(1552605822.195:326): avc: denied { add_name } for pid=17396 comm="syz-executor.5" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 1899.373476] audit: type=1400 audit(1552605822.225:327): avc: denied { create } for pid=17396 comm="syz-executor.5" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 23:23:42 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000001c0)) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:42 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000140)=0x2, 0x4) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) r4 = fcntl$getown(r1, 0x9) getpgrp(r4) prctl$PR_CAPBSET_READ(0x17, 0x21) write$P9_RAUTH(r2, &(0x7f0000000340)={0x14, 0x67, 0x1, {0x0, 0x0, 0x8}}, 0x14) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:42 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x14, 0x0, 0x8, 0x800000001}, 0xb8}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000800)={0x1b4, r2, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x81, @ipv4={[], [], @rand_addr=0x9}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf33f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd4a}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x1}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x13) fchdir(r3) creat(&(0x7f00000004c0)='./bus\x00', 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x20) setsockopt$inet6_int(r5, 0x29, 0x0, &(0x7f0000000600)=0xcb, 0x4) chroot(&(0x7f00000001c0)='./bus\x00') r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000640)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) sendmsg(r7, &(0x7f0000000580)={&(0x7f0000000280)=@in={0x2, 0x4e23, @multicast1}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)="229adb77e2b5f92d4a43f04d6eb3461585c5a4978b66b62a3afcc5bb8f3f86b00dfb9b2e1868022f01314bec", 0x2c}, {0x0}], 0x2}, 0x40440c4) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r6, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r8, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000000301ffff000000000000000000000000af2c0987d1554b0000000000000fffb94fc62444048c9212bf9912b3c89422497319d18afe6e3fa68e364de3ebb5bc54be2eebf2b2420080a70167c8824ac1686e2765e406e748607152395ecc22b9c09680039d1db60c0b50b5f864d96805e5e45c109345318c000000000000"], 0x71}}, 0x0) 23:23:42 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ii0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x101, 0x2, 0x12df, 0x1ff, 0x3, 0x0, 0xf5de, 0x17, 0x40, 0x4a, 0x5, 0x3, 0x38, 0x1, 0x0, 0x7, 0x7f}, [{0x1, 0x3, 0x0, 0x6, 0x7fffffff, 0xf55, 0x7, 0x6}, {0x6474e551, 0x7, 0x3, 0x6, 0x14bc, 0x10001, 0x8, 0x800}], "1fa67784c9fa746706e973d6f2d880d529aa4aece4214100300bc30b4b3db2b544f8c684a96c3cacdc0cc989ed8414935ff8513a845103455abdc199acc9c29a514393f1bdc730e9805a05f88729231237a119bccc1728b085a8a5cdfe86f0e3bdc0ba504a09aaa2e1930e9f234a15734ae6659c400b8fe96ee36187eb704904697bea34de156505537f9e62c7008aea861b1d0b6bf3565d7f910dc2806c027db6d03b35ce659ee575d14476239dbf119c912325ec440c08fc0cd62e028046cb7fa946caf2a24374092986c753de00debc336798fe726f19fa808d0b6cfeecc97d41f356f053f2ad196e", [[], [], [], [], [], [], [], [], [], []]}, 0xb9a) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r4, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = getpgrp(0xffffffffffffffff) recvfrom$packet(r4, &(0x7f00000002c0)=""/193, 0xc1, 0x100, &(0x7f0000000140)={0x11, 0x611985f9fd1734b6, r1, 0x1, 0x7, 0x6, @broadcast}, 0x14) syz_open_procfs(r7, &(0x7f0000000080)='map_files\x00') setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000001240)={0x7ff, {{0x2, 0x4e21, @local}}, 0x1, 0x2, [{{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e23, @multicast2}}]}, 0x190) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:42 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000300)="acc06f1ff2ef93094892c0ab93267697d00c67e5670cda40e30bb87ceb0b3cb77cd53967f7eb1864adf1846d54731f74329951e43e0f4c093eb412994381452e01e13ec6fe3138037b4aa4bde3520deb18081fc6b73b40646ee53bc902e715692685697604d55913814e9c25f26fe6c2b676c745aa110981299ea17378aa86698e01fe2d0b2105af6a2ec2e52566", 0x8e, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', r2) 23:23:42 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x1000000003fff) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:42 executing program 0: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="23163c339fe70d19328b4fed612ab515c787efbe83c986b05213c282170ecb0239cb8fd0c87981d595a6f176b559deb7feff581e43dc8ae89b5d50b45b02f18eaf695d8d9dbcc119e4f501ec597b194815f2eb0a8f166f715b2f6172db045d4e56655628db2caeababb4bf77e8e3a242ee67648f14cabe8a9217ed672b55deb01a58ee5f01d3e8e892ca52b034d613b8519b7c6216acac0162db550a8a14f0537f7c4e9432a4ee96", 0xa8, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000400)={r0, 0xe00000000000, 0xfffffffffffffffc}, &(0x7f0000000440)={'enc=', 'raw', ' hash=', {'sha1_mb\x00'}}, &(0x7f0000000700)="18fa63a05fb2e0095db7969134afeada69544768961647deabe6a16499f22f028da2a8d788117013db9c0e84747c87ba4a5a4c70b66c7f2bee1392a7454f6241ec4f3bbdc9f84e8ba49adf2156c5e10ce7ad3f07c7ad4f437236f4cec4a91423e3749319379066f03741d929dc345d7c52b8f4a10d8660d5c69cc8243e0d4bcc932e362b29c99c12035b08ae37f0982e9fbfe9b33284379812df10dea12f578a1427c7f4fdfb", &(0x7f00000004c0)="eff3c83c7fc540808b9872ff39944a444e0beb5aacbbbee2d879ee45a2") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:tty_device_t:s0\x00', 0x22) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:43 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:43 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x24000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm, @timestamp], 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:43 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r4, 0x107, 0x12, 0x0, 0xfd8d6cf5) sendmmsg(r4, &(0x7f0000000240)=[{{&(0x7f00000002c0)=@caif=@dgm={0x25, 0x3, 0x7ff}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000340)="aceca5c6ed4b2fba3b836588a6684249ea54f01f62a89b5b7349ffd619c02d487d3ba83f6fc8a9b19a5571e2842817c07a45f1402832afaed674e928d06b08705391c1430140ef42142533", 0x4b}, {&(0x7f0000000480)="2f12c168f57e6d18c04af53e59f3d0b0cc1f0a912c101cf68633185b22c8f841e9238405c0ad630bc7f2da25d96e10c606052f521daea44635870ed24932c01ec3f57fcc596d0bf5b907c9c99d6be9543ec230ea5779bd3278d9876270673fe71ae4954dc8e2bbbfa543bc873504e1b2df462ffa579337a7a33e75a237dfc23d279d09c12433d75b52d3a9d852ef", 0x8e}, {&(0x7f00000003c0)="f6b361df6545cd20ee7582d282384c59c6eb3de4056da0421c6dbe0662bcc9dd125f6ad3c4d7e00a8cad2879cad2a6b04514292d991cde9e216754f15b68be06e991f75dd4910b761de2e66d5da739d07eef57a3a3b0af18c9fe9a7f0bbee876c97ac513538b9ec30814562ae4b09f87e2320b", 0x73}, {&(0x7f00000001c0)="6a7801750e7b126c94842a7e4a1dacfdc69b73884b06cae2ce5628a30a5ce7d0fd3abf511aefb94259d1", 0x2a}, {&(0x7f0000000540)="a829629d7936f28e20539d01446e1b2867797da55a2aaf6beb8c24202be7f237b5c9c11a3d1a54f30f5fb3f4cb6ff6eeccc9aded04793e8ec10588a0d2ce61afbf16e27eb14ac225a073e1c3d0fa", 0x4e}, {&(0x7f0000000680)="d2b19605f0df0295571cc7d93737bc7ccee234823add062283e3bc5c1267c683d0d28f6b147a7b3acd2cd2de3e13e3c5c5954c5777d2d33df141780e514ed6950f75c0f82d33802835856d31bb990dcbbb8651a101a312ed6e319f60cc37d3163eb07278fce28fefb73627598eb8affa52438aa8cda6da8ff50acf692468d805f4eaa833f101511d649609ea33cfd8d1ddab5924b384da96227baede6f7f6e697f5598220fbc8822208b1016d3644c49ccaf7aaed514c2fc74e15a1a4b55608ed15c114c4faadbb6f0bfa5729800dd6b69ba6de86e50e38c0f1b5332ed4fe8b623", 0xe1}], 0x6}, 0x311}], 0x1, 0x10) r5 = socket$inet6(0xa, 0x1, 0x1) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f0000000140)={0x7, 0x200}) flistxattr(r4, &(0x7f0000000180)=""/31, 0x1f) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) ioctl$HDIO_GETGEO(r6, 0x301, &(0x7f0000000080)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:43 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x12000000) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000100)) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) keyctl$assume_authority(0x10, r1) r3 = request_key(&(0x7f0000000480)='id_resolver\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000500)='/selinux/avc/hash_stats\x00', 0xffffffffffffffff) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="597e51a55ab9801b28ad4d9d5932f097e06973dbee6067f5d38b70e27520932c5d56953eaafa468a38b43609b9ad788799bb45dcf3889a3f9e6a2361cc720956451e1103e54abd83ac1f8edf720bd70881fe0c105b61eb800e29f136c4c0443964babe3bf6bdcad08a1b6f4dd1b7426cda7d8c526e718911bc906cb06d2697ccf586271a1e220145de95892444d54c586c749e3c67020e6855e8726395c9d56633fe198f19174bc7335e73dd96b66022c022ca86fc698bfc67b9ddf560d0abb4390ac40bde043896dea7", 0xca, r3) clone(0x50200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:43 executing program 4: open(&(0x7f0000000300)='./bus/file0\x00', 0x2900, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x4000, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='io.stat\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x2000, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/stat\x00') r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000200)=0x5) write$FUSE_IOCTL(r5, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r5, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) socket$inet6(0xa, 0x4, 0x6) 23:23:43 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000300)=""/242, &(0x7f0000000100)=0xf2) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000700)=""/4096, &(0x7f0000000000)=0x1000) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1000000084004) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x6) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) setns(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000400)={0x18, 0x1, 0x0, {0x6}}, 0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000480)=0xe8) getgroups(0x4, &(0x7f00000004c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) fchownat(r2, &(0x7f0000000440)='./file0\x00', r5, r6, 0x1400) clone(0x1000000002004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:44 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x14, 0x0, 0x8, 0x800000001}, 0xb8}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000800)={0x1b4, r2, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x76}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x81, @ipv4={[], [], @rand_addr=0x9}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf33f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd4a}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x1}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x13) fchdir(r3) creat(&(0x7f00000004c0)='./bus\x00', 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x20) setsockopt$inet6_int(r5, 0x29, 0x0, &(0x7f0000000600)=0xcb, 0x4) chroot(&(0x7f00000001c0)='./bus\x00') r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000640)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) sendmsg(r7, &(0x7f0000000580)={&(0x7f0000000280)=@in={0x2, 0x4e23, @multicast1}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)="229adb77e2b5f92d4a43f04d6eb3461585c5a4978b66b62a3afcc5bb8f3f86b00dfb9b2e1868022f01314bec", 0x2c}, {0x0}], 0x2}, 0x40440c4) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r6, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r8, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000000301ffff000000000000000000000000af2c0987d1554b0000000000000fffb94fc62444048c9212bf9912b3c89422497319d18afe6e3fa68e364de3ebb5bc54be2eebf2b2420080a70167c8824ac1686e2765e406e748607152395ecc22b9c09680039d1db60c0b50b5f864d96805e5e45c109345318c000000000000"], 0x71}}, 0x0) 23:23:44 executing program 3: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$setown(r1, 0x8, r3) keyctl$assume_authority(0x10, r2) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pwritev(r4, &(0x7f0000000640)=[{&(0x7f0000000300)="4a26f291a560eaea1a03594014890d7dd4372b16e3bf8618c663394fbe64e630d5bf41456ccc75b7ba2169d1cdc6b6aabf413591609c10910fafcabe049711a4b0609ac1b62ea32c984302a8e9d64b281f2f5a27aaef2afd4f9e70efd5cd244bb429e3019b6d8ec0f505cd5ddcd74253bd4f6bc9a6aff30640b3a1278aaa7ad818d9f4fac5f1e80a5319d7546cb3bf", 0x8f}, {&(0x7f00000003c0)="597ee65ea3d85a3adcc39c0481efb2a0b67e2a58fb960494acd4100e8fc741c5c6e9ae7576e816586f2dce14638e7378d2c25d85373c8e30dff4d59f23afaa3be45d1a50aa10d0e1140e5918fdcf6b10a229011d097b9aa724da2581043b457d24cef2897644aa8e3601d634839b03e5758a28512c4b643b4899a683d0ae6a", 0x7f}, {&(0x7f0000000440)="c5bea37ef43e70e6b3c176b6e31e455c0365e42b6e9bba238f6389fd6f5dcacc1c6d4ec784693d6a000ed8dc71051ce33faee69c7aadff94686d42c88e0d49ec1b8efa00e07f5c988d834b92c3eef5116012e263e94fdff25a26caa629a2a12f6780c0f339193c698baaf2de27925f628ebd4538b642b5ab8f44462bd2353c25f718dacf4b8c4954e9599beb9df96ccc138dd92b231e92", 0x97}, {&(0x7f0000000140)}, {&(0x7f0000000700)="464e003feb1724acaec092449b0817ee53a8015d78e85e9b955ca9772d0958d35d2dfcf226e3b8343152d45be60ade2916afde6d37251ac722ded1770b683bfe56b117cf7bd0744798a7fc1bcc82a103bb116dbb4c1cc3683099873514e4b310027b9668ad8359d698dfb34edb9a172ec35df398b5aafcdb937f74c81e97b95f4f98046c475cc74f7c682bbc33d974cbc416bf1b7b0004ef75c09b89cbe282964f1892de6d17afc2a211f8048bfd8dee809eef4d0578150339c071229a0120caef05d9d0e72aa8c6229e9d574157a0666be70efcdd387a15a2eb0a2f4255b11f5d24c0ff9f4e55e78001b942a1e8f78b6cf7", 0xf2}], 0x5, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:44 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) r3 = accept4(r0, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="9c000000", @ANYRES16=r4, @ANYBLOB="180f2dbd7000fcdbdf250100000008000600070000000800060002000000480003000800030001000000080003000300000095000600fe800000000000000000000000000023080005007f000001080003000200dee0703e010001000000080007004e23000008000600040000000800060000020000"], 0x7c}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000040) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:44 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f0000000080), 0x0, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) getsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000002c0)=""/195, &(0x7f0000000080)=0xc3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:44 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7ff, 0x28000) sched_yield() prctl$PR_GET_PDEATHSIG(0x2, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x80000000, 0x4) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) ptrace$setopts(0x4206, r2, 0x7, 0x8) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "528c5d5e673f3754059746ef7e68c19021bf1d0da0a1c1caceb69f1efc63ce0affda0c5248a9681708efa4bfe87785869058fc806fce926d0f22a5e7d4cfdb16", "b0a57735b692aaeb5fcb9a58029822933bef5c3950bb9f016f6554d31b400ad54b66bde273bd0c30e0834e31a50365a0272325f8a01afc2fdb39830cacbad9f6", "ded10791b13782c98ab5ccc5d9c5bced11a55bafc6541561286e5153ee96c62b", [0x7]}) 23:23:44 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote}, 0x0, @in=@multicast2}}, 0xe4) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$inet(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r3 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r3) setsockopt$inet_int(r2, 0x0, 0x40000000000d, &(0x7f0000000140)=0x7fffffff, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000040)=0xfffffffffffffe00, 0x4) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x16, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), 0x0) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120100020000000000000000020000"], 0x10}}, 0x0) close(r1) 23:23:44 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x8, 0x0, 0x40, 0x9, 0x0, 0x200, 0x8, 0x2, 0x3, 0x4, 0x9, 0x884e, 0x6, 0x1, 0xffffffffffffffe0, 0x3ff, 0x5, 0xffff, 0x80, 0x1, 0x3, 0x2dd6, 0x1, 0x7, 0x100000001, 0x100, 0x2, 0x5, 0x4, 0x1, 0xb440, 0xdec, 0x3, 0x9, 0x7, 0x7fff, 0x0, 0x7f, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x20, 0x3, 0x7, 0x8, 0x6, 0x1, 0x4}, 0x0, 0x2, 0xffffffffffffff9c, 0x2) r3 = accept(r0, &(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, &(0x7f0000000440)=0x80) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000700)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000640)={0x58, r4, 0x401, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x600000}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}]}, 0x58}, 0x1, 0x0, 0x0, 0x844}, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, r2, 0x0) r5 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r5) setns(0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:44 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r0, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x210000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)=@gettaction={0x1a4, 0x32, 0x220, 0x70bd2b, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0xb8, 0x1, [{0x18, 0x7, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8}}, {0x10, 0x12, @TCA_ACT_INDEX={0x8}}, {0x14, 0x12, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x2ef8}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x19, @TCA_ACT_INDEX={0x8, 0x3, 0x32}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x14, 0x16, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}, @action_gd=@TCA_ACT_TAB={0xa8, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x4bbb}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0x12, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xa, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6b09}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x401}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x1}, 0x40014) 23:23:44 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:44 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:45 executing program 5: getuid() getuid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@initdev}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) r0 = geteuid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x400001, 0x0) ioprio_get$uid(0x0, r0) 23:23:45 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f0000000080), 0x0, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000040)={'bridge0\x00', 0xfff}) 23:23:45 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:45 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote}, 0x0, @in=@multicast2}}, 0xe4) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$inet(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r3 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r3) setsockopt$inet_int(r2, 0x0, 0x40000000000d, &(0x7f0000000140)=0x7fffffff, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000040)=0xfffffffffffffe00, 0x4) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x16, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), 0x0) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120100020000000000000000020000"], 0x10}}, 0x0) close(r1) 23:23:45 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x3ffb) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:45 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000100)={0x7, &(0x7f0000000000)=[{0x8000, 0x8001, 0x38ed, 0x642}, {0x5, 0x1f, 0x4, 0x20}, {0x7ff, 0x6, 0x6, 0x800}, {0x0, 0x7, 0x5, 0x1}, {0x5, 0x1ff, 0x6, 0x623}, {0xfff, 0x1, 0x4}, {0x3, 0x20, 0x1, 0x2}]}, 0x10) request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='m\xea\xe9Z\xa1\xa4O\x97+QM\xb1w\x8dp^\xc0\xd3\x8a4\xc5\xc4\xb9n\x97\xa6@\xb7 \xe8\xe3\r\b\xa9-\v7\xf4\x03', 0xfffffffffffffffa) 23:23:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)={0x1, 0x2, [@link_local, @random="3ed211f977c6"]}) 23:23:46 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(r0, &(0x7f0000000100)=@caif=@dgm={0x25, 0x400, 0x1}, 0x80) request_key(&(0x7f0000000440)='blacklist\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='\x00', 0xfffffffffffffffc) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0x0) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="4866b86c29de7d4eaabb983334f072d8e43da5994d1a8551916ed274257adb2ceb46e0e3a718b37662", 0x29, 0xfffffffffffffff9) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x381040, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4020200}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x30, r3, 0x404, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8c, 0x200, 0x8001, 0xffffffffffff8000}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000014}, 0x1) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f00000003c0)=0x4, 0x4) keyctl$assume_authority(0x10, r1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setns(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f0000000400)={'ifb0\x00', 0x5f52}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:46 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) r2 = getpid() wait4(r2, &(0x7f0000000000), 0x2, 0x0) 23:23:46 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:46 executing program 5: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x5, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)={0x9, 0x4}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2000, 0x7c) write$eventfd(r0, &(0x7f0000000280)=0xa0000100000001, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x7, &(0x7f0000000080)='md5sum\x00', 0xffffffffffffffff}, 0x30) ptrace(0x10, r2) close(r1) 23:23:46 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x80000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) lseek(r4, 0x0, 0x6) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:46 executing program 0: mkdir(&(0x7f00000004c0)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000640)=0xc) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000300)='\xd1?\xf3\xd7v', r4) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000780)={0x6, 0xffc6, {0x53, 0x101, 0xfffffffffffffffc, {0x65d, 0x1}, {0x3, 0x5}, @period={0x58, 0x3, 0x9, 0x6, 0x7c6000000000000, {0x10000, 0x20, 0x91, 0x1}, 0x4, &(0x7f0000000480)=[0x100000001, 0x0, 0x101, 0x53]}}, {0x53, 0x7fff, 0x401, {0x5, 0x233c}, {0xfff, 0x5}, @const={0x6, {0x20, 0x2, 0x80, 0x67}}}}) 23:23:46 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote}, 0x0, @in=@multicast2}}, 0xe4) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket$inet(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r3 = add_key(&(0x7f00000003c0)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r3) setsockopt$inet_int(r2, 0x0, 0x40000000000d, &(0x7f0000000140)=0x7fffffff, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000040)=0xfffffffffffffe00, 0x4) recvmmsg(r2, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x16, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), 0x0) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120100020000000000000000020000"], 0x10}}, 0x0) close(r1) 23:23:46 executing program 0: r0 = dup(0xffffffffffffffff) setns(r0, 0x6c000000) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd8V', 0x0) 23:23:46 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='self\x00', 0x0) 23:23:46 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$getown(r0, 0x9) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x1, 0x1, 0x400, 0x8, 0x0, 0x2c74, 0x220, 0x2, 0x1000, 0xb7, 0x8, 0x8001, 0x4, 0x9, 0x6, 0x6, 0x5, 0xddc, 0x5, 0x6, 0x4, 0xffff, 0xbe, 0x8000, 0x8, 0x101, 0x5, 0x5, 0x6, 0x4, 0x400, 0x10000, 0xefc, 0x1, 0x60000000000, 0x7, 0x0, 0x40, 0x7, @perf_bp={&(0x7f0000000000), 0x2}, 0x20041, 0x637, 0x7, 0x4, 0x7, 0x10001, 0x10000}, r2, 0x0, r3, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:46 executing program 4: rt_sigreturn() r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:46 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x100) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:46 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f0000000080), 0x0, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000040)={'bridge0\x00', 0xfff}) 23:23:46 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000003c0)=[0xffffffffffffffff]) getgroups(0x2, &(0x7f0000000400)=[r1, r2]) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "3af6b2b2163ca9d32ceedabd7183354c8f7ff437"}, 0x15, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, r3, 0x0, 0x5, &(0x7f0000000440)='user\x00'}, 0x30) ptrace$setopts(0x4200, r5, 0x80000001, 0x2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:47 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:47 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000300)={0x4, 0x72, "7e5b1528004d5fa3f8d0a16d37416d6750592085c4c3a00bf3d7f35308bf8279a2aa9326c10956b4cc4f5a60999ceb1e51f3be121ba2e663618ed3343f4a3fb24f4d5bac6d78741239b41b9b6f2c1ec6c3e27bd96c80ffa559959d45c7676de7484b1c11e113e987a6f8e6d229ce52e67b62"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:47 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) mlockall(0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000240)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x1) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(0xffffffffffffffff, 0x10) splice(r5, &(0x7f0000000080), r2, &(0x7f0000000140), 0x49d, 0x2) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(r5, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:47 executing program 3: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f0000000080), 0x0, 0xffffffffffffffff) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000040)={'bridge0\x00', 0xfff}) 23:23:47 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) select(0xffffffffffffffdc, &(0x7f0000000000)={0x3, 0x5d3b, 0x0, 0x4, 0x2000000000000000, 0x7, 0x2, 0x1}, &(0x7f0000000100)={0x9, 0x1ff, 0x7ff, 0x1000, 0x3bdb, 0x116, 0x4, 0x7}, &(0x7f0000000140)={0x2, 0x3bcf, 0x20, 0x7, 0x4, 0x3, 0x0, 0x6}, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:47 executing program 1: r0 = socket(0x15, 0x4000000000080003, 0xfffffffffffffff7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r2, 0x0, 0x9, &(0x7f0000000080)='ip6_vti0\x00'}, 0x30) r7 = geteuid() getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240)=0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={r6, r7, r8}, 0xc) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:47 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="442cc2d8db6b9bf6140d46c0595515c0c22905cb567622cc3b8900670143e22ffca4fe311031a77ebd73119b16d986b829765610f91d940cea4082b658080d5d72873235221c376cd6f4c7e7810bc708e99623f108e6e838b640239b399ea41a18b384232760c450018cc3f062dcc3d03c3f0a0ef7074814fef189ce42744f9e9de71e37ee8d932f90bbe156e253782584154e88f1e0c916cd91351ffcc048db6ba448e274ecaf8e9ad4b9609f58fed65bf085908fcf1ea4274685bdf5cc3530da3e3dd27896b06a9822c927c27931f18bb93381a18eab17dc01562935314ede25d1ba925427a77e221fd3fa64c2a23dff273727", 0xf4, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000440)={r2, 0x8, 0x3}, 0x0, &(0x7f0000000480)="056c533965e30af86b73577871265b406892695be859a27563baf9a6398eb88f338ce221ecc507833bef7bf18418f029f85f1da4c2d8e3dd6cf5c6b17193ba7f2b3b3440c974aaf3c0d41505696166771f26412294ee843b1b234a3f8c771307fe7a229f74a61ea4c072492168eec832384ad8e00144efac57e337f1e121d59afa7953df2989ab2dfca51b60b1eae052aae8bcf8e5852a1a30f5f13c1278214330c25af0", &(0x7f0000000640)="32c1ad4c4d27980a25adcab7674e6f3d56ed9f5ba77a66a4b6710033e57abe3dd31da95107604d48c2c6073352c063522d4fe024ba2e3af0e10cd090860dbcaa9a1afdd06216f29c378ec7557c18921ffabc68ad89f8c445f205ad322c8581ac104ddab6d2d0ac374bb0e28d14c9834aea378cd6d8c9edf3e37267017b55ed") ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_current(r0, &(0x7f0000000700)=@profile={'changeprofile ', 'user\x00'}, 0x13) 23:23:47 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:47 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:47 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:48 executing program 5: unshare(0x24000000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') setns(r0, 0x0) r1 = dup(r0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 23:23:48 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000440)="78aaae466420eea0b5ae444f90ffe124e256d51b48bfa359530f6d85a54ae6eeba88fc1823aef4310f752dbfdb7d30ace836e61eb42fdb3d7ce956b64672cf3d04ac8e14b154e6f923fbb0d784545d938fd0b297e646d074aeece90cb171ba194311407995f8ad53aec27ba3a7fbce7659c95cdabb3be13f94f47dd87da75d16a53988d6429d69169bf850bd7341ef8c475698163f63e0444ec6", 0x9a, 0xfffffffffffffffb) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000300)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000300)={0x4, 0x72, "7e5b1528004d5fa3f8d0a16d37416d6750592085c4c3a00bf3d7f35308bf8279a2aa9326c10956b4cc4f5a60999ceb1e51f3be121ba2e663618ed3343f4a3fb24f4d5bac6d78741239b41b9b6f2c1ec6c3e27bd96c80ffa559959d45c7676de7484b1c11e113e987a6f8e6d229ce52e67b62"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:48 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x10000, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'ip6_vti\xce\x17\x00\x00\x02\x00', r1}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r5, &(0x7f00000001c0), 0xfffffef3) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r7 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) readv(r7, &(0x7f0000000080)=[{&(0x7f0000000140)=""/121, 0x79}, {&(0x7f00000002c0)=""/158, 0x9e}], 0x2) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r4, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f00000001c0)={'ah\x00'}, &(0x7f0000000240)=0x1e) fchmod(r6, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:48 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:48 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r0, 0x4, 0x4104) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0xfffffffffffffffa, 0xfffffffffffffffb}]}, 0xc, 0x0) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x3, 0x0, 0x8001}) 23:23:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="7a05f651c65b5ea696e0d4", 0xb}], 0x1, 0x0) lseek(r0, 0x20400000, 0x0) 23:23:48 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='trusted)md5sumwlan0:\x00', 0xfffffffffffffffa) request_key(&(0x7f0000000300)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', r2) 23:23:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="7a05f651c65b5ea696e0d4", 0xb}], 0x1, 0x0) lseek(r0, 0x20400000, 0x0) 23:23:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="7a05f651c65b5ea696e0d4", 0xb}], 0x1, 0x0) lseek(r0, 0x20400000, 0x0) 23:23:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="7a05f651c65b5ea696e0d4", 0xb}], 0x1, 0x0) lseek(r0, 0x20400000, 0x0) 23:23:48 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='%\x00', 0xfffffffffffffffa) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000300)="3965e5c3efa8c79d66690ee95f65c5c9f559fb0fbef9209229a6f3ca34449ee36076dd8895642c88e8a937fb9372713702af51a7f3d239ad7573092f683962771e21568a", 0x44, r1) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102002005, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:49 executing program 5: unshare(0x24000000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') setns(r0, 0x0) r1 = dup(r0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 23:23:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x20400000, 0x0) 23:23:49 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000700)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x100, 0x0) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000480)={0x506e}) r5 = dup(r1) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r5, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x100, r6, 0xa08, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x433}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaa2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe1}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_NET={0x4}]}, 0x100}}, 0x4) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:49 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) write$P9_RLERRORu(r2, &(0x7f0000000080)={0x15, 0x7, 0x2, {{0x8, 'keyring\x00'}, 0x401}}, 0x15) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:49 executing program 3: lseek(0xffffffffffffffff, 0x20400000, 0x0) 23:23:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='.$cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:49 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) flistxattr(r1, &(0x7f0000000300)=""/154, 0x9a) 23:23:49 executing program 5: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000700)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x100, 0x0) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000480)={0x506e}) r5 = dup(r1) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r5, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x100, r6, 0xa08, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x433}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaa2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe1}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_NET={0x4}]}, 0x100}}, 0x4) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:49 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x0, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:49 executing program 3: lseek(0xffffffffffffffff, 0x20400000, 0x0) 23:23:49 executing program 3: lseek(0xffffffffffffffff, 0x20400000, 0x0) 23:23:49 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xe8) r5 = getgid() fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = geteuid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1000080, &(0x7f0000000700)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x7}}, {@max_read={'max_read', 0x3d, 0x100000001}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@measure='measure'}, {@fowner_eq={'fowner', 0x3d, r6}}, {@dont_hash='dont_hash'}, {@obj_type={'obj_type', 0x3d, '\\%lo'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@fowner_lt={'fowner<', r8}}]}}) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x204000, 0x0) ioctl$RTC_EPOCH_SET(r9, 0x4008700e, 0x200) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:49 executing program 3: r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x20400000, 0x0) 23:23:49 executing program 3: r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x20400000, 0x0) 23:23:49 executing program 3: r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x20400000, 0x0) 23:23:49 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x21) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r5) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x5, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r7 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r3, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f00000002c0)={0x6, 0x8, 0x1}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r6, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) socketpair(0x15, 0x6, 0x0, &(0x7f0000000300)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @remote, @multicast1}, &(0x7f0000000140)=0xc) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:49 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000300)=""/130, 0x82}, {&(0x7f00000003c0)=""/135, 0x87}, {&(0x7f0000000000)=""/64, 0x40}], 0x4, &(0x7f00000004c0)=""/90, 0x5a}, 0x22) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000001700)={'mangle\x00', 0xb1, "47c756578c1676bea0b2fbdef708162ff4a32cd8d21b00a125a03579eee568c9b0996f624a689f0ace62d612e7bc27f2773a25463ce9cf37570e1b9294be6fb133e3cfa79d9020a5a50b9a482349fb2479524157f584a03c9b6d7d7184949586ac265d7de8310afaba93ca499e95cb7489e90a93ff4aec2a56c8be5e520990f3ac20f7a82ebafc7618b179977de72986465e2e3459c22389ac640e8e247b0ad1563b6ef96e4afe05198f16a207424fdb7c"}, &(0x7f0000000680)=0xd5) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000001c0)={0x4, 0x2, 0x6, 0x0, 0x0, [{r1, 0x0, 0x5}, {r0}, {r1, 0x0, 0x2}, {r1, 0x0, 0x6}, {r0, 0x0, 0xfffffffffffff800}, {r2, 0x0, 0x9}]}) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(0xffffffffffffffff, 0x20400000, 0x0) 23:23:50 executing program 5: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='%\x00', 0xfffffffffffffffa) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000300)="3965e5c3efa8c79d66690ee95f65c5c9f559fb0fbef9209229a6f3ca34449ee36076dd8895642c88e8a937fb9372713702af51a7f3d239ad7573092f683962771e21568a", 0x44, r1) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102002005, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x0, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(0xffffffffffffffff, 0x20400000, 0x0) 23:23:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(0xffffffffffffffff, 0x20400000, 0x0) 23:23:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x0, 0x0) 23:23:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x0, 0x0) 23:23:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x0, 0x0) 23:23:50 executing program 3: getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000080)='fd/4\x00') lseek(r1, 0x20400000, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x9a, 0x1, 0x2, "1723c6d4801ade5f14a1f927c89b9a28", "2e504554ade1002e4a060024e05f6443ce3eba0520c58ac423b73854a42c1ed085c3a08000d0df93ed008fe5cd2cc82e0cedcdb6"}, 0x47, 0x3) 23:23:50 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r5 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000140)={'veth1_to_bond\x00', 0x600}) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000080)='netdevsim0\x00', 0x10) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:50 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) prctl$PR_SET_FPEXC(0xc, 0xc0080) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000480)=0xe90b, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r1, 0x20400000, 0x0) 23:23:50 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x0, &(0x7f00000002c0)={0x81, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e24, @local}}}, 0x108) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x4000010104001) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x147}]) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x0, 0x7fffffff, 0x5, 0x3}, {0x1, 0x11a9ff46, 0x2, 0x7f}, {0x1, 0xb4, 0x3f, 0x8001}]}, 0x10) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) 23:23:50 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x0, 0x0) 23:23:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x20400000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 23:23:51 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(r1, r2) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f0000000100)={{0x2c, @local, 0x4e22, 0x4, 'dh\x00', 0x10, 0x6, 0xc}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x0, 0x7e, 0x5, 0x6}}, 0x44) read(r0, &(0x7f0000000400), 0x0) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r2, 0x0, 0x5, &(0x7f0000000000)='user\x00'}, 0x30) ioprio_get$pid(0x1, r5) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) inotify_init() 23:23:51 executing program 3: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000040)='personality\x00') lseek(r1, 0x20400000, 0x0) 23:23:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') 23:23:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x203ffffd, 0xfffffffffffffffe) 23:23:51 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r6 = socket$inet6(0xa, 0x1, 0x1) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x100000000000, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) times(&(0x7f0000000240)) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r7, 0x5411, &(0x7f00000001c0)) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r4, 0x1f, 0x4d6}, 0x0, &(0x7f0000000140)="9b78b5011183dd5c6bdb5e68c96515f424a5828d423f9d03ef955417c27541474dbdc8eb6e9261ff3910f460cbba46fe29f046cc71602da5066170295ac4822dfac7b964f3b370b4f0a1524fcc5af0a24a984316c15c5f2072034f5e11836486422fb1", &(0x7f00000002c0)=""/220) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x20400000, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000000)=""/94) 23:23:51 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:51 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, 0x0, 0x0) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x323) mlockall(0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x4000080) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) write$FUSE_POLL(r1, &(0x7f0000000540)={0x18, 0xfffffffffffffffe, 0x1, {0x3298}}, 0x18) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r5 = socket(0x10, 0x80002, 0x0) bind$netlink(r5, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000180)={0x0, 0x0, {0x34, 0x6, 0xb, 0x1d, 0x8, 0xff, 0x0, 0x124}}) write(r5, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) times(&(0x7f0000000440)) ioctl$sock_SIOCGSKNS(r5, 0x894c, &(0x7f00000002c0)=0x8) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000080), 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x1c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) connect$netlink(r5, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) creat(&(0x7f00000000c0)='./bus\x00', 0x11) sendto(r5, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) write$binfmt_misc(r4, &(0x7f00000003c0)=ANY=[@ANYRESDEC=0x0], 0x14) sendfile(r1, r4, &(0x7f0000000140), 0x8fff) 23:23:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffee5}, 0xfffffeba) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x3) fcntl$setstatus(r2, 0x4, 0x4001) io_setup(0xb, &(0x7f0000000100)=0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x3, 0x3}]}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}) 23:23:51 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:51 executing program 3: open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x27) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x20400000, 0x0) 23:23:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x20400000, 0x4) ioctl$TCFLSH(r0, 0x540b, 0x1) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0x0, 0x7, {0x3}}, 0x18) 23:23:51 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) clone(0x20000, &(0x7f0000000100)="2256770b0c684bc8dc78b8fcb57578feabaacc55d4d3a3c0bb6353bb438af632ae0db5ab5b9fe6303922ca95dcc6dc550644e3ce0104c87f485fe02fd0c61fddb9b7cb96c3536fd832a2356f195d1b6f530128105e2010e50ff3e676e45ee659663f0c39f884d6", &(0x7f0000000000), &(0x7f0000000300), &(0x7f0000000340)="ce3419f0f3e73e0f3a677e8baebe60d87604d67b5ec696705f5167306bcdd22e8f68a2a6841e106c18e95fddc80ca25feb") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 23:23:51 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r0, 0x20400000, 0x0) pread64(r0, &(0x7f0000000000)=""/223, 0xdf, 0x0) 23:23:51 executing program 3: r0 = gettid() syz_open_procfs(r0, &(0x7f0000000000)='net/igmp6\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000280)='projid_map\x00') lseek(r1, 0x20400000, 0x0) ptrace$cont(0x18, r0, 0x6, 0x7) [ 1909.083881] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18118 comm=syz-executor.5 23:23:52 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="f9ed92b6b84ebf99ca79a6d198111d0995979dfb79cab5ba050db34e", 0x1c, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='&.eth0[.)\'\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='/dev/null\x00', 0xfffffffffffffffe) r4 = request_key(&(0x7f0000000400)='blacklist\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)='keyring\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000580)='keyring\x00', 0x0, 0x0, 0x0, r4) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) r6 = socket$inet6(0xa, 0x1, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet(r2, &(0x7f0000000600)=""/67, 0x43, 0x1, 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) fchmod(r5, 0x10) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) listen(0xffffffffffffffff, 0x3) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:52 executing program 2: r0 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x1000}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000440)) setsockopt$inet_group_source_req(r6, 0x0, 0x2b, 0x0, 0x0) fchmod(r4, 0x10) ioctl$sock_SIOCGIFBR(r2, 0x8940, 0x0) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 23:23:52 executing program 0: mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'syzkaller1\x00', {0x2, 0x4e23, @multicast2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330e4d3da8759d0b0701b950ace9f7510735458610f88d20b9f1acd7c43b5758509796efe60373fcf516535ba47455527d1d03d9aa9e51f", 0xe4, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r1) setns(0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$input_event(r2, &(0x7f0000000100)={{0x77359400}, 0x16, 0x9, 0x2}, 0x18) 23:23:52 executing program 3: lseek(0xffffffffffffffff, 0x0, 0x0) [ 1909.399698] BUG: sleeping function called from invalid context at ./include/linux/percpu-rwsem.h:33 [ 1909.408937] in_atomic(): 1, irqs_disabled(): 0, pid: 18146, name: syz-executor.2 [ 1909.416497] 2 locks held by syz-executor.2/18146: [ 1909.421337] #0: (&pipe->mutex/1){+.+.+.}, at: [] pipe_wait+0x1a3/0x1d0 [ 1909.430486] #1: (&mm->mmap_sem){++++++}, at: [] __do_page_fault+0x272/0xa60 [ 1909.439929] Preemption disabled at:[ 1909.443384] [] __do_softirq+0xdd/0x964 [ 1909.448882] CPU: 0 PID: 18146 Comm: syz-executor.2 Not tainted 4.9.141+ #1 [ 1909.455887] ffff8801db607660 ffffffff81b42e79 ffffffff8281ca6d 0000000000000000 [ 1909.463961] 0000000000000100 ffff88017183af80 ffff88017183af80 ffff8801db607698 [ 1909.472044] ffffffff813f9ecf ffff88017183af80 ffffffff82ad6720 0000000000000021 [ 1909.480122] Call Trace: [ 1909.482701] [ 1909.484766] [] dump_stack+0xc1/0x128 [ 1909.490158] [] ? __do_softirq+0xdd/0x964 [ 1909.495880] [] ___might_sleep.cold.31+0x18a/0x1fc [ 1909.502382] [] ? ext4_mark_inode_dirty+0xb40/0xb40 [ 1909.508957] [] __might_sleep+0x95/0x1a0 [ 1909.514575] [] ext4_writepages+0x16d/0x2e00 [ 1909.520541] [] ? check_preemption_disabled+0x3b/0x200 [ 1909.527385] [] ? _flat_send_IPI_mask+0x7b/0xb0 [ 1909.533615] [] ? flat_send_IPI_mask+0x2b/0x40 [ 1909.539758] [] ? ext4_mark_inode_dirty+0xb40/0xb40 [ 1909.546333] [] ? resched_curr+0x201/0x380 [ 1909.552137] [] ? check_preemption_disabled+0x3b/0x200 [ 1909.558970] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1909.565721] [] ? try_to_wake_up+0x5b2/0xf80 [ 1909.571783] [] ? ext4_mark_inode_dirty+0xb40/0xb40 [ 1909.578374] [] do_writepages+0xef/0x1d0 [ 1909.584021] [] ? page_writeback_cpu_online+0x20/0x20 [ 1909.590822] [] ? try_to_wake_up+0x5b2/0xf80 [ 1909.596791] [] ? page_fault+0x25/0x30 [ 1909.602240] [] ? pipe_write+0x219/0xd50 [ 1909.607864] [] ? migrate_swap_stop+0x810/0x810 [ 1909.614106] [] __filemap_fdatawrite_range+0x1a9/0x250 [ 1909.620944] [] ? replace_page_cache_page+0x600/0x600 [ 1909.627694] [] ? wake_bit_function+0xda/0x170 [ 1909.633834] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 1909.640760] [] filemap_write_and_wait_range+0x59/0xb0 [ 1909.647598] [] __generic_file_fsync+0x93/0x1a0 [ 1909.653826] [] ext4_sync_file+0x659/0x10a0 [ 1909.659707] [] ? ext4_llseek+0x8e0/0x8e0 [ 1909.665460] [] vfs_fsync_range+0x10c/0x260 [ 1909.671340] [] dio_complete+0x512/0x6c0 [ 1909.676967] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1909.683806] [] ? ext4_update_bh_state+0xf0/0xf0 [ 1909.690129] [] dio_bio_end_aio+0x11c/0x370 [ 1909.696008] [] ? dio_complete+0x6c0/0x6c0 [ 1909.701801] [] bio_endio+0x1a5/0x1f0 [ 1909.707165] [] blk_update_request+0x248/0x9b0 [ 1909.713306] [] scsi_end_request+0x9d/0x5c0 [ 1909.719198] [] scsi_io_completion+0x273/0x17a0 [ 1909.725440] [] ? scsi_unblock_requests+0x50/0x50 [ 1909.731939] [] ? check_preemption_disabled+0x3b/0x200 [ 1909.738777] [] ? scsi_handle_queue_ramp_up+0x32a/0x430 [ 1909.745702] [] ? sd_completed_bytes+0x3f0/0x3f0 [ 1909.752013] [] scsi_finish_command+0x3ba/0x530 [ 1909.758244] [] scsi_softirq_done+0x250/0x360 [ 1909.764300] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1909.771140] [] blk_done_softirq+0x27d/0x3e0 [ 1909.777111] [] ? trigger_softirq+0x210/0x210 [ 1909.783167] [] __do_softirq+0x20e/0x964 [ 1909.788785] [] ? check_preemption_disabled+0x3b/0x200 [ 1909.795650] [] irq_exit+0x11c/0x150 [ 1909.800919] [] do_IRQ+0x10d/0x1c0 [ 1909.806022] [] common_interrupt+0x9d/0x9d [ 1909.811816] [ 1909.813877] [] ? handle_mm_fault+0xad7/0x2350 [ 1909.820045] [] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1909.826709] [] handle_mm_fault+0xad7/0x2350 [ 1909.832676] [] ? get_page_from_freelist+0xda3/0x1d80 [ 1909.839421] [] ? vm_insert_page+0x6f0/0x6f0 [ 1909.845393] [] ? get_page_from_freelist+0xe92/0x1d80 [ 1909.852147] [] __do_page_fault+0x403/0xa60 [ 1909.858038] [] ? bad_area_access_error+0x3a0/0x3a0 [ 1909.864613] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1909.871273] [] do_page_fault+0x27/0x30 [ 1909.876809] [] page_fault+0x25/0x30 [ 1909.882085] [] ? copy_user_enhanced_fast_string+0x7/0x10 [ 1909.889190] [] ? copy_page_from_iter+0x1c0/0x610 [ 1909.895593] [] pipe_write+0x219/0xd50 [ 1909.901038] [] __vfs_write+0x3d7/0x580 [ 1909.906570] [] ? __vfs_read+0x560/0x560 [ 1909.912194] [] ? selinux_file_permission+0x82/0x470 [ 1909.918855] [] ? rw_verify_area+0xe5/0x2a0 [ 1909.924730] [] vfs_write+0x187/0x520 [ 1909.930100] [] SyS_write+0xd9/0x1c0 [ 1909.935378] [] ? SyS_read+0x1c0/0x1c0 [ 1909.940827] [] ? do_syscall_64+0x48/0x550 [ 1909.946621] [] ? SyS_read+0x1c0/0x1c0 [ 1909.952067] [] do_syscall_64+0x19f/0x550 [ 1909.957783] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1909.964765] [ 1909.966387] ========================================================= [ 1909.972956] [ INFO: possible irq lock inversion dependency detected ] [ 1909.979539] 4.9.141+ #1 Tainted: G W [ 1909.984379] --------------------------------------------------------- [ 1909.990950] syz-executor.2/18146 just changed the state of lock: [ 1909.997081] (&sbi->s_journal_flag_rwsem){.+.?.+}, at: [] do_writepages+0xef/0x1d0 but this lock took another, SOFTIRQ-unsafe lock in the past: [ 1910.013126] (&ei->i_data_sem){++++..} [ 1910.017104] [ 1910.017104] and interrupts could create inverse lock ordering between them. [ 1910.017104] [ 1910.021457] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18162 comm=syz-executor.5 [ 1910.039393] [ 1910.039393] other info that might help us debug this: [ 1910.046050] Possible interrupt unsafe locking scenario: [ 1910.046050] [ 1910.052969] CPU0 CPU1 [ 1910.057624] ---- ---- [ 1910.062624] lock(&ei->i_data_sem); [ 1910.066609] local_irq_disable(); [ 1910.072656] lock(&sbi->s_journal_flag_rwsem); [ 1910.080116] lock(&ei->i_data_sem); [ 1910.086622] [ 1910.089375] lock(&sbi->s_journal_flag_rwsem); [ 1910.094502] [ 1910.094502] *** DEADLOCK *** [ 1910.094502] [ 1910.100859] 2 locks held by syz-executor.2/18146: [ 1910.105694] #0: (&pipe->mutex/1){+.+.+.}, at: [] pipe_wait+0x1a3/0x1d0 [ 1910.115158] #1: (&mm->mmap_sem){++++++}, at: [] __do_page_fault+0x272/0xa60 [ 1910.124541] [ 1910.124541] the shortest dependencies between 2nd lock and 1st lock: [ 1910.132502] -> (&ei->i_data_sem){++++..} ops: 1375512 { [ 1910.138632] HARDIRQ-ON-W at: [ 1910.142124] __lock_acquire+0x10b0/0x4a10 [ 1910.148084] lock_acquire+0x130/0x3e0 [ 1910.153713] down_write+0x41/0xa0 [ 1910.158989] ext4_release_file+0x25b/0x2e0 [ 1910.165040] __fput+0x263/0x700 [ 1910.170136] ____fput+0x15/0x20 [ 1910.175232] task_work_run+0x10c/0x180 [ 1910.180937] exit_to_usermode_loop+0x129/0x150 [ 1910.187334] do_syscall_64+0x3e2/0x550 [ 1910.193042] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1910.199964] HARDIRQ-ON-R at: [ 1910.203459] __lock_acquire+0xb79/0x4a10 [ 1910.209334] lock_acquire+0x130/0x3e0 [ 1910.214971] down_read+0x44/0xb0 [ 1910.220155] ext4_map_blocks+0x361/0x16d0 [ 1910.226128] ext4_getblk+0x2cc/0x450 [ 1910.231657] ext4_find_entry+0xa94/0x12c0 [ 1910.237620] ext4_lookup+0x139/0x5e0 [ 1910.243150] lookup_slow+0x24a/0x470 [ 1910.248681] walk_component+0x822/0xcf0 [ 1910.254471] path_lookupat.isra.10+0x186/0x410 [ 1910.260871] filename_lookup.part.18+0x177/0x370 [ 1910.267444] user_path_at_empty+0x53/0x70 [ 1910.273410] do_mount+0x134/0x28a0 [ 1910.278766] SyS_mount+0xea/0x100 [ 1910.284038] devtmpfs_mount+0x49/0x70 [ 1910.289655] prepare_namespace+0x1e4/0x210 [ 1910.295703] kernel_init_freeable+0x38e/0x3ac [ 1910.302015] kernel_init+0x11/0x15e [ 1910.307461] ret_from_fork+0x5c/0x70 [ 1910.312987] SOFTIRQ-ON-W at: [ 1910.316480] __lock_acquire+0xbdd/0x4a10 [ 1910.322363] lock_acquire+0x130/0x3e0 [ 1910.327983] down_write+0x41/0xa0 [ 1910.333255] ext4_release_file+0x25b/0x2e0 [ 1910.339310] __fput+0x263/0x700 [ 1910.344404] ____fput+0x15/0x20 [ 1910.349504] task_work_run+0x10c/0x180 [ 1910.355208] exit_to_usermode_loop+0x129/0x150 [ 1910.361605] do_syscall_64+0x3e2/0x550 [ 1910.367307] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1910.374227] SOFTIRQ-ON-R at: [ 1910.377743] __lock_acquire+0xbdd/0x4a10 [ 1910.383619] lock_acquire+0x130/0x3e0 [ 1910.389240] down_read+0x44/0xb0 [ 1910.394424] ext4_map_blocks+0x361/0x16d0 [ 1910.400390] ext4_getblk+0x2cc/0x450 [ 1910.405919] ext4_find_entry+0xa94/0x12c0 [ 1910.411882] ext4_lookup+0x139/0x5e0 [ 1910.417409] lookup_slow+0x24a/0x470 [ 1910.422937] walk_component+0x822/0xcf0 [ 1910.428727] path_lookupat.isra.10+0x186/0x410 [ 1910.435127] filename_lookup.part.18+0x177/0x370 [ 1910.441698] user_path_at_empty+0x53/0x70 [ 1910.447662] do_mount+0x134/0x28a0 [ 1910.453017] SyS_mount+0xea/0x100 [ 1910.458285] devtmpfs_mount+0x49/0x70 [ 1910.463906] prepare_namespace+0x1e4/0x210 [ 1910.469955] kernel_init_freeable+0x38e/0x3ac [ 1910.476267] kernel_init+0x11/0x15e [ 1910.481708] ret_from_fork+0x5c/0x70 [ 1910.487232] INITIAL USE at: [ 1910.490647] __lock_acquire+0x654/0x4a10 [ 1910.496436] lock_acquire+0x130/0x3e0 [ 1910.501969] down_read+0x44/0xb0 [ 1910.507066] ext4_map_blocks+0x361/0x16d0 [ 1910.512965] ext4_getblk+0x2cc/0x450 [ 1910.518407] ext4_find_entry+0xa94/0x12c0 [ 1910.524285] ext4_lookup+0x139/0x5e0 [ 1910.529731] lookup_slow+0x24a/0x470 [ 1910.535175] walk_component+0x822/0xcf0 [ 1910.540892] path_lookupat.isra.10+0x186/0x410 [ 1910.547205] filename_lookup.part.18+0x177/0x370 [ 1910.553686] user_path_at_empty+0x53/0x70 [ 1910.559560] do_mount+0x134/0x28a0 [ 1910.564831] SyS_mount+0xea/0x100 [ 1910.570033] devtmpfs_mount+0x49/0x70 [ 1910.575564] prepare_namespace+0x1e4/0x210 [ 1910.581531] kernel_init_freeable+0x38e/0x3ac [ 1910.587756] kernel_init+0x11/0x15e [ 1910.593124] ret_from_fork+0x5c/0x70 [ 1910.598559] } [ 1910.600443] ... key at: [] __key.74437+0x0/0x40 [ 1910.607268] ... acquired at: [ 1910.610545] lock_acquire+0x130/0x3e0 [ 1910.614519] down_write+0x41/0xa0 [ 1910.618143] ext4_map_blocks+0x6d3/0x16d0 [ 1910.622462] ext4_writepages+0x1551/0x2e00 [ 1910.626878] do_writepages+0xef/0x1d0 [ 1910.630845] __filemap_fdatawrite_range+0x1a9/0x250 [ 1910.636027] filemap_flush+0x23/0x30 [ 1910.639909] ext4_alloc_da_blocks+0xd9/0x330 [ 1910.644483] ext4_release_file+0x1ff/0x2e0 [ 1910.648883] __fput+0x263/0x700 [ 1910.652344] ____fput+0x15/0x20 [ 1910.655799] task_work_run+0x10c/0x180 [ 1910.659885] exit_to_usermode_loop+0x129/0x150 [ 1910.664634] do_syscall_64+0x3e2/0x550 [ 1910.668689] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1910.673950] [ 1910.675572] -> (&sbi->s_journal_flag_rwsem){.+.?.+} ops: 196556 { [ 1910.682485] HARDIRQ-ON-R at: [ 1910.685892] __lock_acquire+0xb79/0x4a10 [ 1910.691592] lock_acquire+0x130/0x3e0 [ 1910.697037] ext4_writepages+0x19e/0x2e00 [ 1910.702826] do_writepages+0xef/0x1d0 [ 1910.708275] __filemap_fdatawrite_range+0x1a9/0x250 [ 1910.714937] SyS_fadvise64_64+0x6db/0x7d0 [ 1910.720733] SyS_fadvise64+0x2c/0x40 [ 1910.726136] do_syscall_64+0x19f/0x550 [ 1910.731668] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1910.738406] IN-SOFTIRQ-R at: [ 1910.741855] __lock_acquire+0x1084/0x4a10 [ 1910.747647] lock_acquire+0x130/0x3e0 [ 1910.753117] ext4_writepages+0x19e/0x2e00 [ 1910.758907] do_writepages+0xef/0x1d0 [ 1910.764349] __filemap_fdatawrite_range+0x1a9/0x250 [ 1910.771017] filemap_write_and_wait_range+0x59/0xb0 [ 1910.777681] __generic_file_fsync+0x93/0x1a0 [ 1910.783736] ext4_sync_file+0x659/0x10a0 [ 1910.789439] vfs_fsync_range+0x10c/0x260 [ 1910.795151] dio_complete+0x512/0x6c0 [ 1910.800600] dio_bio_end_aio+0x11c/0x370 [ 1910.806310] bio_endio+0x1a5/0x1f0 [ 1910.811495] blk_update_request+0x248/0x9b0 [ 1910.817461] scsi_end_request+0x9d/0x5c0 [ 1910.823163] scsi_io_completion+0x273/0x17a0 [ 1910.829212] scsi_finish_command+0x3ba/0x530 [ 1910.835267] scsi_softirq_done+0x250/0x360 [ 1910.841154] blk_done_softirq+0x27d/0x3e0 [ 1910.846956] __do_softirq+0x20e/0x964 [ 1910.852406] irq_exit+0x11c/0x150 [ 1910.857503] do_IRQ+0x10d/0x1c0 [ 1910.862429] ret_from_intr+0x0/0x20 [ 1910.867699] handle_mm_fault+0xad7/0x2350 [ 1910.873496] __do_page_fault+0x403/0xa60 [ 1910.879223] do_page_fault+0x27/0x30 [ 1910.884581] page_fault+0x25/0x30 [ 1910.889679] pipe_write+0x219/0xd50 [ 1910.894947] __vfs_write+0x3d7/0x580 [ 1910.900316] vfs_write+0x187/0x520 [ 1910.905496] SyS_write+0xd9/0x1c0 [ 1910.910596] do_syscall_64+0x19f/0x550 [ 1910.916132] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1910.922875] SOFTIRQ-ON-R at: [ 1910.926286] __lock_acquire+0xbdd/0x4a10 [ 1910.931987] lock_acquire+0x130/0x3e0 [ 1910.937432] ext4_writepages+0x19e/0x2e00 [ 1910.943220] do_writepages+0xef/0x1d0 [ 1910.948665] __filemap_fdatawrite_range+0x1a9/0x250 [ 1910.955325] SyS_fadvise64_64+0x6db/0x7d0 [ 1910.961127] SyS_fadvise64+0x2c/0x40 [ 1910.966488] do_syscall_64+0x19f/0x550 [ 1910.972030] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1910.978771] RECLAIM_FS-ON-R at: [ 1910.982451] mark_held_locks+0xc7/0x130 [ 1910.988332] lockdep_trace_alloc+0x18e/0x2a0 [ 1910.994648] kmem_cache_alloc+0x2d/0x2b0 [ 1911.001071] ext4_init_io_end+0x25/0x100 [ 1911.007049] ext4_writepages+0xcd0/0x2e00 [ 1911.013110] do_writepages+0xef/0x1d0 [ 1911.018822] __filemap_fdatawrite_range+0x1a9/0x250 [ 1911.025739] filemap_flush+0x23/0x30 [ 1911.031362] ext4_alloc_da_blocks+0xd9/0x330 [ 1911.037676] ext4_release_file+0x1ff/0x2e0 [ 1911.043813] __fput+0x263/0x700 [ 1911.048996] ____fput+0x15/0x20 [ 1911.054183] task_work_run+0x10c/0x180 [ 1911.059998] exit_to_usermode_loop+0x129/0x150 [ 1911.066486] do_syscall_64+0x3e2/0x550 [ 1911.072277] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1911.079277] INITIAL USE at: [ 1911.082611] __lock_acquire+0x654/0x4a10 [ 1911.088228] lock_acquire+0x130/0x3e0 [ 1911.093585] ext4_writepages+0x19e/0x2e00 [ 1911.099287] do_writepages+0xef/0x1d0 [ 1911.104645] __filemap_fdatawrite_range+0x1a9/0x250 [ 1911.111217] SyS_fadvise64_64+0x6db/0x7d0 [ 1911.116927] SyS_fadvise64+0x2c/0x40 [ 1911.122196] do_syscall_64+0x19f/0x550 [ 1911.127640] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1911.134294] } [ 1911.136104] ... key at: [] rwsem_key.75130+0x0/0x40 [ 1911.143191] ... acquired at: [ 1911.146290] check_usage_forwards+0x14e/0x290 [ 1911.150953] mark_lock+0x6ec/0x1290 [ 1911.154744] __lock_acquire+0x1084/0x4a10 [ 1911.159058] lock_acquire+0x130/0x3e0 [ 1911.163025] ext4_writepages+0x19e/0x2e00 [ 1911.167367] do_writepages+0xef/0x1d0 [ 1911.171340] __filemap_fdatawrite_range+0x1a9/0x250 [ 1911.176617] filemap_write_and_wait_range+0x59/0xb0 [ 1911.181803] __generic_file_fsync+0x93/0x1a0 [ 1911.186382] ext4_sync_file+0x659/0x10a0 [ 1911.190612] vfs_fsync_range+0x10c/0x260 [ 1911.194837] dio_complete+0x512/0x6c0 [ 1911.198804] dio_bio_end_aio+0x11c/0x370 [ 1911.203033] bio_endio+0x1a5/0x1f0 [ 1911.206738] blk_update_request+0x248/0x9b0 [ 1911.211228] scsi_end_request+0x9d/0x5c0 [ 1911.215462] scsi_io_completion+0x273/0x17a0 [ 1911.220035] scsi_finish_command+0x3ba/0x530 [ 1911.224612] scsi_softirq_done+0x250/0x360 [ 1911.229014] blk_done_softirq+0x27d/0x3e0 [ 1911.233326] __do_softirq+0x20e/0x964 [ 1911.237303] irq_exit+0x11c/0x150 [ 1911.240923] do_IRQ+0x10d/0x1c0 [ 1911.244375] ret_from_intr+0x0/0x20 [ 1911.248171] handle_mm_fault+0xad7/0x2350 [ 1911.252488] __do_page_fault+0x403/0xa60 [ 1911.256715] do_page_fault+0x27/0x30 [ 1911.260595] page_fault+0x25/0x30 [ 1911.264214] pipe_write+0x219/0xd50 [ 1911.268006] __vfs_write+0x3d7/0x580 [ 1911.271884] vfs_write+0x187/0x520 [ 1911.275590] SyS_write+0xd9/0x1c0 [ 1911.279212] do_syscall_64+0x19f/0x550 [ 1911.283270] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1911.288530] [ 1911.290149] [ 1911.290149] stack backtrace: [ 1911.294639] CPU: 0 PID: 18146 Comm: syz-executor.2 Tainted: G W 4.9.141+ #1 [ 1911.302857] ffff8801db6072d0 ffffffff81b42e79 ffffffff84010b80 ffff8801db6073a0 [ 1911.310932] ffff88017183af80 0000000000000001 ffffffff84010b80 ffff8801db607320 [ 1911.319016] ffffffff813ff4da 0000000100000000 ffffffff83cab520 ffffffff83ca2910 [ 1911.327087] Call Trace: [ 1911.329669] [ 1911.331736] [] dump_stack+0xc1/0x128 [ 1911.337132] [] print_irq_inversion_bug.cold.38+0x319/0x32d [ 1911.344399] [] check_usage_forwards+0x14e/0x290 [ 1911.350710] [] ? print_irq_inversion_bug+0x90/0x90 [ 1911.357283] [] ? __save_stack_trace+0x7d/0xf0 [ 1911.363423] [] ? save_stack_trace+0x16/0x20 [ 1911.369388] [] ? save_trace+0xe0/0x250 [ 1911.374917] [] mark_lock+0x6ec/0x1290 [ 1911.380369] [] ? print_irq_inversion_bug+0x90/0x90 [ 1911.386947] [] __lock_acquire+0x1084/0x4a10 [ 1911.392914] [] ? mark_held_locks+0xc7/0x130 [ 1911.398880] [] ? retint_kernel+0x2d/0x2d [ 1911.404588] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1911.411422] [] ? trace_hardirqs_on+0x10/0x10 [ 1911.417476] [] ? check_preemption_disabled+0x3b/0x200 [ 1911.424311] [] ? retint_kernel+0x2d/0x2d [ 1911.430021] [] ? dump_stack+0x105/0x128 [ 1911.435642] [] ? dump_stack+0x10f/0x128 [ 1911.441259] [] lock_acquire+0x130/0x3e0 [ 1911.446874] [] ? do_writepages+0xef/0x1d0 [ 1911.452670] [] ? ext4_mark_inode_dirty+0xb40/0xb40 [ 1911.459242] [] ? ext4_mark_inode_dirty+0xb40/0xb40 [ 1911.465819] [] ext4_writepages+0x19e/0x2e00 [ 1911.471784] [] ? do_writepages+0xef/0x1d0 [ 1911.477575] [] ? check_preemption_disabled+0x3b/0x200 [ 1911.484414] [] ? _flat_send_IPI_mask+0x7b/0xb0 [ 1911.490637] [] ? flat_send_IPI_mask+0x2b/0x40 [ 1911.496773] [] ? ext4_mark_inode_dirty+0xb40/0xb40 [ 1911.503383] [] ? resched_curr+0x201/0x380 [ 1911.509177] [] ? check_preemption_disabled+0x3b/0x200 [ 1911.516008] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 1911.522758] [] ? try_to_wake_up+0x5b2/0xf80 [ 1911.528722] [] ? ext4_mark_inode_dirty+0xb40/0xb40 [ 1911.535292] [] do_writepages+0xef/0x1d0 [ 1911.540913] [] ? page_writeback_cpu_online+0x20/0x20 [ 1911.547660] [] ? try_to_wake_up+0x5b2/0xf80 [ 1911.553628] [] ? page_fault+0x25/0x30 [ 1911.559067] [] ? pipe_write+0x219/0xd50 [ 1911.564694] [] ? migrate_swap_stop+0x810/0x810 [ 1911.570918] [] __filemap_fdatawrite_range+0x1a9/0x250 [ 1911.577749] [] ? replace_page_cache_page+0x600/0x600 [ 1911.584501] [] ? wake_bit_function+0xda/0x170 [ 1911.590640] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 1911.597564] [] filemap_write_and_wait_range+0x59/0xb0 [ 1911.604402] [] __generic_file_fsync+0x93/0x1a0 [ 1911.610628] [] ext4_sync_file+0x659/0x10a0 [ 1911.616510] [] ? ext4_llseek+0x8e0/0x8e0 [ 1911.622219] [] vfs_fsync_range+0x10c/0x260 [ 1911.628108] [] dio_complete+0x512/0x6c0 [ 1911.633731] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1911.640565] [] ? ext4_update_bh_state+0xf0/0xf0 [ 1911.646880] [] dio_bio_end_aio+0x11c/0x370 [ 1911.652756] [] ? dio_complete+0x6c0/0x6c0 [ 1911.658550] [] bio_endio+0x1a5/0x1f0 [ 1911.663910] [] blk_update_request+0x248/0x9b0 [ 1911.670065] [] scsi_end_request+0x9d/0x5c0 [ 1911.675962] [] scsi_io_completion+0x273/0x17a0 [ 1911.682201] [] ? scsi_unblock_requests+0x50/0x50 [ 1911.688601] [] ? check_preemption_disabled+0x3b/0x200 [ 1911.695433] [] ? scsi_handle_queue_ramp_up+0x32a/0x430 [ 1911.702361] [] ? sd_completed_bytes+0x3f0/0x3f0 [ 1911.708684] [] scsi_finish_command+0x3ba/0x530 [ 1911.714908] [] scsi_softirq_done+0x250/0x360 [ 1911.720972] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1911.727807] [] blk_done_softirq+0x27d/0x3e0 [ 1911.733773] [] ? trigger_softirq+0x210/0x210 [ 1911.739828] [] __do_softirq+0x20e/0x964 [ 1911.745448] [] ? check_preemption_disabled+0x3b/0x200 [ 1911.752281] [] irq_exit+0x11c/0x150 [ 1911.757551] [] do_IRQ+0x10d/0x1c0 [ 1911.762652] [] common_interrupt+0x9d/0x9d [ 1911.768441] [ 1911.770500] [] ? handle_mm_fault+0xad7/0x2350 [ 1911.776672] [] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1911.783335] [] handle_mm_fault+0xad7/0x2350 [ 1911.789305] [] ? get_page_from_freelist+0xda3/0x1d80 [ 1911.796051] [] ? vm_insert_page+0x6f0/0x6f0 [ 1911.802015] [] ? get_page_from_freelist+0xe92/0x1d80 [ 1911.808762] [] __do_page_fault+0x403/0xa60 [ 1911.814642] [] ? bad_area_access_error+0x3a0/0x3a0 [ 1911.821217] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1911.827873] [] do_page_fault+0x27/0x30 [ 1911.833407] [] page_fault+0x25/0x30 [ 1911.838683] [] ? copy_user_enhanced_fast_string+0x7/0x10 [ 1911.845779] [] ? copy_page_from_iter+0x1c0/0x610 [ 1911.852175] [] pipe_write+0x219/0xd50 [ 1911.857619] [] __vfs_write+0x3d7/0x580 [ 1911.863153] [] ? __vfs_read+0x560/0x560 [ 1911.868769] [] ? selinux_file_permission+0x82/0x470 [ 1911.875441] [] ? rw_verify_area+0xe5/0x2a0 [ 1911.881320] [] vfs_write+0x187/0x520 [ 1911.886680] [] SyS_write+0xd9/0x1c0 [ 1911.891950] [] ? SyS_read+0x1c0/0x1c0 [ 1911.897399] [] ? do_syscall_64+0x48/0x550 [ 1911.903192] [] ? SyS_read+0x1c0/0x1c0 [ 1911.908633] [] do_syscall_64+0x19f/0x550 [ 1911.914339] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1911.921349] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:51 [ 1911.929869] in_atomic(): 1, irqs_disabled(): 0, pid: 18146, name: syz-executor.2 [ 1911.937424] INFO: lockdep is turned off. [ 1911.941484] Preemption disabled at:[ 1911.944977] [] __do_softirq+0xdd/0x964 [ 1911.950458] CPU: 0 PID: 18146 Comm: syz-executor.2 Tainted: G W 4.9.141+ #1 [ 1911.958676] ffff8801db607a20 ffffffff81b42e79 ffffffff8281ca6d 0000000000000000 [ 1911.966860] 0000000000000100 ffff88017183af80 ffff88017183af80 ffff8801db607a58 [ 1911.974931] ffffffff813f9ecf ffff88017183af80 ffffffff82a4fa80 0000000000000033 [ 1911.983009] Call Trace: [ 1911.985603] [ 1911.987666] [] dump_stack+0xc1/0x128 [ 1911.993055] [] ? __do_softirq+0xdd/0x964 [ 1911.998776] [] ___might_sleep.cold.31+0x18a/0x1fc [ 1912.005263] [] __might_sleep+0x95/0x1a0 [ 1912.010884] [] ? filemap_fdatawait_range+0x39/0x50 [ 1912.017462] [] down_write+0x21/0xa0 [ 1912.022737] [] __generic_file_fsync+0xc1/0x1a0 [ 1912.028963] [] ext4_sync_file+0x659/0x10a0 [ 1912.034841] [] ? ext4_llseek+0x8e0/0x8e0 [ 1912.040550] [] vfs_fsync_range+0x10c/0x260 [ 1912.046436] [] dio_complete+0x512/0x6c0 [ 1912.052058] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1912.058892] [] ? ext4_update_bh_state+0xf0/0xf0 [ 1912.065223] [] dio_bio_end_aio+0x11c/0x370 [ 1912.071107] [] ? dio_complete+0x6c0/0x6c0 [ 1912.076989] [] bio_endio+0x1a5/0x1f0 [ 1912.082342] [] blk_update_request+0x248/0x9b0 [ 1912.088483] [] scsi_end_request+0x9d/0x5c0 [ 1912.094377] [] scsi_io_completion+0x273/0x17a0 [ 1912.100627] [] ? scsi_unblock_requests+0x50/0x50 [ 1912.107371] [] ? check_preemption_disabled+0x3b/0x200 [ 1912.114199] [] ? scsi_handle_queue_ramp_up+0x32a/0x430 [ 1912.121142] [] ? sd_completed_bytes+0x3f0/0x3f0 [ 1912.127456] [] scsi_finish_command+0x3ba/0x530 [ 1912.133675] [] scsi_softirq_done+0x250/0x360 [ 1912.139714] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1912.146533] [] blk_done_softirq+0x27d/0x3e0 [ 1912.152482] [] ? trigger_softirq+0x210/0x210 [ 1912.158522] [] __do_softirq+0x20e/0x964 [ 1912.164126] [] ? check_preemption_disabled+0x3b/0x200 [ 1912.170953] [] irq_exit+0x11c/0x150 [ 1912.176236] [] do_IRQ+0x10d/0x1c0 [ 1912.181321] [] common_interrupt+0x9d/0x9d [ 1912.187093] [ 1912.189148] [] ? handle_mm_fault+0xad7/0x2350 [ 1912.195310] [] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1912.201952] [] handle_mm_fault+0xad7/0x2350 [ 1912.207905] [] ? get_page_from_freelist+0xda3/0x1d80 [ 1912.214634] [] ? vm_insert_page+0x6f0/0x6f0 [ 1912.220583] [] ? get_page_from_freelist+0xe92/0x1d80 [ 1912.227331] [] __do_page_fault+0x403/0xa60 [ 1912.233216] [] ? bad_area_access_error+0x3a0/0x3a0 [ 1912.239784] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.246436] [] do_page_fault+0x27/0x30 [ 1912.251961] [] page_fault+0x25/0x30 [ 1912.257217] [] ? copy_user_enhanced_fast_string+0x7/0x10 [ 1912.264299] [] ? copy_page_from_iter+0x1c0/0x610 [ 1912.270682] [] pipe_write+0x219/0xd50 [ 1912.276123] [] __vfs_write+0x3d7/0x580 [ 1912.281642] [] ? __vfs_read+0x560/0x560 [ 1912.287279] [] ? selinux_file_permission+0x82/0x470 [ 1912.293925] [] ? rw_verify_area+0xe5/0x2a0 [ 1912.299789] [] vfs_write+0x187/0x520 [ 1912.305131] [] SyS_write+0xd9/0x1c0 [ 1912.310384] [] ? SyS_read+0x1c0/0x1c0 [ 1912.315810] [] ? do_syscall_64+0x48/0x550 [ 1912.321581] [] ? SyS_read+0x1c0/0x1c0 [ 1912.327009] [] do_syscall_64+0x19f/0x550 [ 1912.332719] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1912.339700] ------------[ cut here ]------------ [ 1912.344453] kernel BUG at ./include/linux/pagemap.h:147! [ 1912.349878] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1912.355218] Modules linked in: [ 1912.358510] CPU: 0 PID: 18146 Comm: syz-executor.2 Tainted: G W 4.9.141+ #1 [ 1912.366710] task: ffff88017183af80 task.stack: ffff88008f5a8000 [ 1912.372741] RIP: 0010:[] [] find_get_pages_range_tag+0x52b/0x8f0 [ 1912.382227] RSP: 0018:ffff8801db607678 EFLAGS: 00010206 [ 1912.387669] RAX: ffff88017183af80 RBX: ffffea0004914e40 RCX: 1ffff1003b6c0ee2 [ 1912.394923] RDX: 0000000000000100 RSI: ffffffff8140dd8b RDI: ffffffff831f2500 [ 1912.402183] RBP: ffff8801db607768 R08: 0000000000000000 R09: 0000000000000000 [ 1912.409444] R10: ffff88017183af80 R11: 0000000000000000 R12: ffffea0004914e20 [ 1912.416721] R13: ffffea0004914e60 R14: ffffea0004914e40 R15: dffffc0000000000 [ 1912.423972] FS: 00007f8abadbf700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 1912.432176] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1912.438035] CR2: 0000000020589000 CR3: 0000000127bb2000 CR4: 00000000001606b0 [ 1912.445284] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1912.452529] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1912.459773] Stack: [ 1912.461924] ffffffff8140d906 ffffed0043fffa03 1ffff1003b6c0edc ffff8801db607700 [ 1912.469939] 0000000183080360 ffff880181e074c8 ffff8801db607848 ffff8801db6077f8 [ 1912.477936] 0000000000000fff 000000000000000e ffffffff810a6ab3 ffffed00270be68d [ 1912.485942] Call Trace: [ 1912.488500] [ 1912.490544] [] ? find_get_pages_range_tag+0xa6/0x8f0 [ 1912.497300] [] ? kvm_clock_read+0x23/0x40 [ 1912.503073] [] ? find_get_pages_contig+0x8b0/0x8b0 [ 1912.509631] [] ? lapic_next_event+0x60/0x90 [ 1912.515590] [] pagevec_lookup_range_tag+0x40/0x80 [ 1912.522071] [] __filemap_fdatawait_range+0x11a/0x270 [ 1912.528826] [] ? wait_on_page_bit+0x140/0x140 [ 1912.534951] [] ? tick_setup_hrtimer_broadcast+0x40/0x40 [ 1912.541958] [] ? hrtimer_interrupt+0x1d7/0x430 [ 1912.548184] [] ? trace_hardirqs_on+0x10/0x10 [ 1912.554219] [] ? hrtimer_interrupt+0x338/0x430 [ 1912.560426] [] ? check_preemption_disabled+0x3b/0x200 [ 1912.567258] [] ? do_writepages+0xf7/0x1d0 [ 1912.573033] [] ? page_writeback_cpu_online+0x20/0x20 [ 1912.579762] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1912.586320] [] filemap_fdatawait_range+0x25/0x50 [ 1912.592700] [] filemap_fdatawait+0x68/0x90 [ 1912.598568] [] __writeback_single_inode+0x73e/0x1020 [ 1912.605317] [] ? writeback_single_inode+0x244/0x440 [ 1912.611964] [] writeback_single_inode+0x24f/0x440 [ 1912.618432] [] sync_inode_metadata+0xac/0xe0 [ 1912.624465] [] ? sync_inode+0x30/0x30 [ 1912.629893] [] __generic_file_fsync+0x141/0x1a0 [ 1912.636188] [] ext4_sync_file+0x659/0x10a0 [ 1912.642051] [] ? ext4_llseek+0x8e0/0x8e0 [ 1912.647758] [] vfs_fsync_range+0x10c/0x260 [ 1912.653624] [] dio_complete+0x512/0x6c0 [ 1912.659229] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1912.666046] [] ? ext4_update_bh_state+0xf0/0xf0 [ 1912.672341] [] dio_bio_end_aio+0x11c/0x370 [ 1912.678206] [] ? dio_complete+0x6c0/0x6c0 [ 1912.683981] [] bio_endio+0x1a5/0x1f0 [ 1912.689320] [] blk_update_request+0x248/0x9b0 [ 1912.695448] [] scsi_end_request+0x9d/0x5c0 [ 1912.701313] [] scsi_io_completion+0x273/0x17a0 [ 1912.707521] [] ? scsi_unblock_requests+0x50/0x50 [ 1912.713906] [] ? check_preemption_disabled+0x3b/0x200 [ 1912.720740] [] ? scsi_handle_queue_ramp_up+0x32a/0x430 [ 1912.727656] [] ? sd_completed_bytes+0x3f0/0x3f0 [ 1912.733952] [] scsi_finish_command+0x3ba/0x530 [ 1912.740161] [] scsi_softirq_done+0x250/0x360 [ 1912.746214] [] ? trace_hardirqs_on_caller+0x266/0x590 [ 1912.753038] [] blk_done_softirq+0x27d/0x3e0 [ 1912.758984] [] ? trigger_softirq+0x210/0x210 [ 1912.765018] [] __do_softirq+0x20e/0x964 [ 1912.770620] [] ? check_preemption_disabled+0x3b/0x200 [ 1912.777438] [] irq_exit+0x11c/0x150 [ 1912.782712] [] do_IRQ+0x10d/0x1c0 [ 1912.787825] [] common_interrupt+0x9d/0x9d [ 1912.793596] [ 1912.795641] [] ? handle_mm_fault+0xad7/0x2350 [ 1912.801785] [] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1912.808427] [] handle_mm_fault+0xad7/0x2350 [ 1912.814391] [] ? get_page_from_freelist+0xda3/0x1d80 [ 1912.821130] [] ? vm_insert_page+0x6f0/0x6f0 [ 1912.827103] [] ? get_page_from_freelist+0xe92/0x1d80 [ 1912.833839] [] __do_page_fault+0x403/0xa60 [ 1912.839709] [] ? bad_area_access_error+0x3a0/0x3a0 [ 1912.846295] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.852942] [] do_page_fault+0x27/0x30 [ 1912.858459] [] page_fault+0x25/0x30 [ 1912.863730] [] ? copy_user_enhanced_fast_string+0x7/0x10 [ 1912.870820] [] ? copy_page_from_iter+0x1c0/0x610 [ 1912.877202] [] pipe_write+0x219/0xd50 [ 1912.882626] [] __vfs_write+0x3d7/0x580 [ 1912.888138] [] ? __vfs_read+0x560/0x560 [ 1912.893739] [] ? selinux_file_permission+0x82/0x470 [ 1912.900384] [] ? rw_verify_area+0xe5/0x2a0 [ 1912.906245] [] vfs_write+0x187/0x520 [ 1912.911583] [] SyS_write+0xd9/0x1c0 [ 1912.916838] [] ? SyS_read+0x1c0/0x1c0 [ 1912.922357] [] ? do_syscall_64+0x48/0x550 [ 1912.928132] [] ? SyS_read+0x1c0/0x1c0 [ 1912.933561] [] do_syscall_64+0x19f/0x550 [ 1912.939266] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1912.946167] Code: f0 ff 48 c7 c2 80 53 a9 82 be 6d 03 00 00 48 c7 c7 e0 53 a9 82 c6 05 41 d4 fc 01 01 e8 7f 67 df ff e9 bf fb ff ff e8 d5 dc f0 ff <0f> 0b e8 ce dc f0 ff 4d 8d 74 24 ff e9 d1 fc ff ff 48 89 9d 60 [ 1912.973221] RIP [] find_get_pages_range_tag+0x52b/0x8f0 [ 1912.980348] RSP [ 1912.984004] ---[ end trace 269f38d657af5211 ]--- [ 1912.988750] Kernel panic - not syncing: Fatal exception in interrupt [ 1912.995514] Kernel Offset: disabled [ 1912.999126] Rebooting in 86400 seconds..