S(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:43 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a687567afd4878266735fb8b6348419743a73302073797374656d5f753673797305656d5f723a6b3030303030304910303030304330333200421e10c846d21b06d98cef7d11b187800102dbbb5ff93a6a0e4dc527f000000000fb447ff356b68df939ef0a0d37170f6b806a397b208f8c98e1ecebb2446afa5fab7c1c58d5c531f60000000000060f7300a18e32269d6f26c034fcd09ee34cb570ac2cb527b4ce650000000000000000000000000000000000009501d0692d3ba215a21fb62205007b9f8b2c6376a5544bd0f1577c3ce9e1788b34122a2d8895769300a6ad8b51059de3ee69c8f15cb0c0b15ee2769b95196fe3301e60c5616e2b88a384f9f389da77ff1c82b2a196c336fd417c45bcb8f10f926440aaf3b204b8f6a4fb55cdb07f319927d962155abd42b12f038b1aecc83b2785dbd8ccc3d43c74b52e1358ac3fb98a7a3208ca67be941a6b857ff91e011ddfb546d3cdaaad0f7ad4039c93e52b07c4f96ccfb49cc5b4625d29add3b3b1eef571174804dd416cbeaa2603824f04b40c4f0722ccedff6ac969563df5b41de29458d4c780984d8a2fa00f2b16d257c85e46f27b8ac8cca670b7224453a4198aad001437148e38029d8f529bb959dff9cace32c3d5511b1606e3b2d2040517ac3f524d65178afc8195cbf74896fb568d03cb858f4dcd075acf4386e07e0561ae025ac8ef55f88f92613635a13d83f043c0ce097b9970d8f5c36499632091f19035fcf03c0a6e021dc4ec11c2ccfec8bf022e5aa0fc434bae3579a2ab696d9a8f4d45fd"], 0xfffffffffffffe8e) 13:36:43 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) recvfrom$packet(r1, &(0x7f0000000080)=""/9, 0xfffffffffffffecd, 0x10001, &(0x7f0000000280)={0x11, 0x16, r2, 0x1, 0xffffffff}, 0xffffffffffffffea) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000100)=""/49) write$selinux_access(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765ce26c54a3a9bc39b5c71c8742b3a6b650000656d5f743a733020303030303030303030303030303030303030333200000000000000000000000000000000240e3bb4da073cfa8d40659b4a216454cd0219c3c5dbb0457f50c36c69b8e53311e86dcc1ede69c83f802c4b4c828856cca5754b5333f783eaac14a0b614d8e7d784220502b3ff31761b27a000c248002563fb581c27bfb6681b3ac6724c6b9d7c32f0b4d6cd"], 0x54) 13:36:43 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:43 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'system_u:system_r:kernel_t:s0'}) 13:36:43 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:43 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000140)=ANY=[], 0xfffffffffffffeeb) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast2, @local}, &(0x7f0000000080)=0xc) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x5, 0x2, 0x6c, 0x40, r0, 0x8ca1, [], r1, r2, 0x4, 0x4}, 0x3c) 13:36:43 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x20}, 0x46) 13:36:44 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:44 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'\x00', 0x3}) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x29e224bccecb04a0, 0x100) write$selinux_context(r2, &(0x7f00000000c0)='system_u:object_r:tetex_data_t:s0\x00', 0xffffffffffffff5a) write$selinux_access(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765746c6266735f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a733020303030303030303030303030301d30303030333200"], 0xffdd) 13:36:44 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x7d05fb804062e9f0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:44 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:36:44 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) recvfrom$inet(r0, &(0x7f0000000180)=""/124, 0x7c, 0x12022, &(0x7f0000000200)={0x2, 0x4e21, @loopback}, 0x10) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765746c6266735f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a73302030303030303030303030303030303030303033320027ba9f6bc8a16ed11a8fc0fe4d65061cca434c13935a2a5fe5478b725c0943d521f1a2bb2f55e3fe49cb03f5247bac353b5cf3eeeb5cc8017f703a69c5d728d024643d4487686433460553f52de44e77d26443565ffb7441704d30941793c589707e7712455d5802464bb40c419d0dee321a03eb9e48b7df345e922dd66d9df6edc5561eddfe354618b54e308d407d500c"], 0x54) 13:36:44 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) epoll_wait(r2, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:44 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:44 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:44 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x4, 0xfffffffffffffff9, 0x6, 0xfe9}, {0x2, 0x0, 0x8, 0x3}, {0x8, 0x7fff, 0xdd68, 0x80000001}, {0x8, 0x1, 0x836, 0x1}, {0x9df, 0x800, 0x5, 0x100000000}, {0xffffffffffffffff, 0x1, 0x2, 0x3}, {0x6, 0x7, 0x1000000000, 0x1ff}]}) 13:36:44 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:44 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) fremovexattr(r1, &(0x7f0000000000)=@random={'user.', ']vmnet0}\x00'}) 13:36:44 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) getuid() 13:36:44 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000100)=""/118) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000240), &(0x7f00000002c0)=0xc) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000300), 0x4) r3 = dup(r0) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f00000001c0)=""/107) getsockopt$inet_udp_int(r2, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) signalfd(r2, &(0x7f0000000180)={0x6}, 0x8) 13:36:44 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xb0, r2, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x269400}]}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @empty, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @local, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x80) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 13:36:44 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 1467.565486] audit: type=1400 audit(1565530604.993:460): avc: denied { setopt } for pid=15590 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:36:45 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:45 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40080001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r3, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x10, 0x4, [0xffffffffffffc7f2, 0xf0b, 0x8000]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x9, 0x80000001, 0x1, 0x4]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x4000) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000240)={0xd7ea, 0x4, 0xbf93, 0x563}, 0x10) 13:36:45 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:45 executing program 5: write$selinux_access(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765746c6266735f743a73302073797374656d5f753a73797374650000000000000f81656c5f743a733020303030303030303030303030303030303030333200"], 0x54) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) getpgrp(r0) 13:36:45 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:45 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:45 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:45 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r1, &(0x7f0000000200)=[{&(0x7f0000000180)="c870718310df3b09dac46a8b9a2c70f12cf4293f0235ea51c4796529d178833315602f34265605506da2a3613b0077e6f8d9e9030457b9d359d0c43c5c16eeca1942a0e89d8701cc8836a51f12ea606bd0cdc7ff31e72078e1fcb7f670205d05", 0x60}, {&(0x7f00000002c0)="2b84eb414eaffad25d5e9b2b541c4891ad2a13495346d47c33d5bf6b9aff275b54c144781bebceff4fe1681bdf37b2d137fc698e99ac6c015b180f991e676fdef3f9598c3d92bbc72662744233af82ccb67ee7783447edd0f13fed5de09aeee4e2b5704e9817349361499ac907b486d43932f55b36538b5cf6985bd2ba7611d45858dff0a8f423116a8d889c6fbad4a67a243062ae6e9b19ffc0ecc2fc4f74a2e8ce9fa75bf420d468dcdf1180fa541fd22e31d0d4666219ba55988fc3e3ac3d4a4ae290", 0xc4}, {&(0x7f00000003c0)="4e474d18491f5e63ecaa347d3162904fd4f7c1ada064a6bb6c6bc0f71bf8dc430a218c4f87b68a66afa29954c2189592249f435124be0015e58885a0c9fa10989881d44b278240c37a2679ca738ebfda91e58961c2440034c82d5161633443ecc5675ca0ef720c334c05b8e81650bc487096f845bc142fdf2ace1cb8577be0473b7330d68d4cda2c5995fa97549031d5dd9d744c2a538e5e6b152712ade455d0fe01b582018d8415b27bad78fc3abef7d82acdbe3d9f7c2c43704f51913230", 0xbf}, {&(0x7f0000000480)="780da8d4fad35c6fd5a888d8ff833612bf28b05110434685d3a00112f1e113d5ac5336e4bf1f3fd32c8d48fad1acbeff6c46829b5289312dc3bc232b980c82d6cfaad5efdb8023089886d89c964f6b67ef3219e5a416230fef14fb5d524942e93761b3cfd6c3c661152b92bc0ffc3195127eb05026fceabf81d45e9dddff1dbecbb44350b22a55e8bd70f28d7375c26afa587e3ce370f8a07d7f1be130623bcde60147ba1dea38cd840b34bd040729217e4b6a08b4ac1bea8cb9b49e866168828158b08ce2f7de5b", 0xc8}], 0x4) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) getrandom(&(0x7f0000000140)=""/60, 0x3c, 0x2) socket$inet6(0xa, 0x2, 0x1) ppoll(&(0x7f0000000000)=[{r0, 0x241}, {r0, 0x100}, {r2, 0x40}, {r1}, {r1, 0x10}, {r0, 0x100}, {r0, 0x8000}, {r0, 0x20}], 0x8, &(0x7f0000000080), &(0x7f0000000100)={0x7f}, 0x8) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCNXCL(r3, 0x540d) ftruncate(r1, 0x4) 13:36:45 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000200)=""/140, &(0x7f0000000100)=0x8c) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') write$selinux_access(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765746c6266735f743a7330206f797374656d44753a73797374656d5f723a6b65726e5b6c5f743a5c2da7d73030303030303030303030303030303030303900dc07cbea6eb0f6d0ae817e407071ba9efe737beb67c983b4c57df878f73136b17936603571172fa0b7f6403d329be63017ef606ba1ef17a1c8dbbd984ff9d9b1f15a1256571ab6bd041d0bd8dff6eff3de03e3"], 0x54) 13:36:45 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:45 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:45 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:45 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRESDEC=r0, @ANYRESDEC=0x0, @ANYRES16, @ANYRESOCT=r0, @ANYPTR, @ANYBLOB="9db2fb8e2a7e1937ebd7d4864d5c41e97170988e26be19510271b850a3fee2cbd35fb42c3e880bf6a77ffe316b03e657c70b64d495bea5a53615f871fdca1506bdf4d19fea36aeb2fafa7783c61dad70514dc4a68c355eeb950979fd1892acc6f4e1025e723659faa5c3f622e2c4d85103dd72e871e795ecbd8f8ddb5083d18c938a1ddf5581dbda98a223b1c9f321ff7e512a6c12a9f59702ca43e70d22"]], 0xfffffffffffffefc) 13:36:45 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:46 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 13:36:46 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) r1 = socket$inet6(0xa, 0x5, 0x5) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000080)={'security\x00', 0x2b, "edd0af6923f20ad87d74c228b2e70022a7f1b73e9c4a94f2234b61c6ce11d8d9e1be5a722735a771c71b2d"}, &(0x7f0000000000)=0x4f) 13:36:46 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:46 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000007180)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000007280)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000072c0)={r3, 0x1, 0x6, @random="daa53bc6655e"}, 0x10) 13:36:46 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:46 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:46 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000000)=ANY=[], 0xc5866f4b51f3efa9) 13:36:46 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:46 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$rtc(&(0x7f0000000340)='/dev/rtc#\x00', 0x6, 0x400000) ioctl$RTC_WIE_ON(r2, 0x700f) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/mls\x00', 0x0, 0x0) write$eventfd(r3, &(0x7f0000000300)=0x2, 0x8) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x3, 0xc3, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000100)=""/195}, &(0x7f0000000080)=0x78) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:46 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:46 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000001300)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000012c0)={&(0x7f0000001280)={0x40, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xd636}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xf8}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x1f6e6feff3fc36e1) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfc, 0x2}, 0xc) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:46 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000440)="11000000000bcfe47bf070a6937aeffd6d0f7c1b25ad9dbe85a721f80d26a3ebb2ecb829ad429c291cf2c41867b53a8bad0d2aef915f2e56e9173dec6b24575c130e32a43c33225628f25823d0899decaf494f69cd5f18f6d9dcf8b03dd4ee0daab7947b136a75f7f48de4354350c2d5fa0719e9d0bee5b6018bb332d1692b49a90000f63a97000100000001d64fec71dc1075fcb298fcd699b0dbe0c433d7d2bc2a6af262c18639") writev(r0, &(0x7f0000000280)=[{&(0x7f0000000100)="a703c1c028d73ff4b951987b8cf08b5a6c74a3fe57e25297c4a7124df1336d05006116655724d32d8ce1acf7716d3d49b8dabf11beadd527ac25042bc0ae5aa6a7b443d07cb0627da84597d351f26c3ce37bd47df4dabe79036b6422e3c778ff9805e24a98a22672565728cba736e6f067367d46343d1cf94f7d7355b54b545837f6e1c36fc231a0a334479fa24a6c77c9fa6e43fbec5b2557a6a9a10601207c67591a74f2d069bff183309b59e0e8a3623aa633c99844c438e1d4e7cf092a03f04d1d6954", 0xfffffffffffffed6}], 0x1) 13:36:46 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f720ccb48b065746c6266735f743a73302073797374656d5f753a73797374ff0f7c1e79762dcc23caeabf9faa0620b4875f723a6b65726e656c5f743a7330203030303030000000000000"], 0x54) 13:36:46 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:47 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x8000, 0x0) r3 = fcntl$dupfd(r0, 0x406, r1) ioctl$RTC_WIE_ON(r2, 0x700f) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000100)=""/218, 0xda}, {&(0x7f00000002c0)=""/152, 0x98}, {&(0x7f0000000000)=""/47, 0x2f}, {&(0x7f0000000380)=""/248, 0xf8}, {&(0x7f0000000480)=""/162, 0xa2}], 0x5, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000580)=""/206) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000680)={'netdevsim0\x00', @broadcast}) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000540)) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x2b3}], 0x100000000000009b) 13:36:47 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x54) 13:36:47 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) inotify_init() write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:47 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:47 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$binfmt_aout(r0, &(0x7f0000000740)={{0xcc, 0x4ce, 0xf9, 0x5d, 0x25, 0x8, 0x4b, 0x3}, "8fe5dc1531c0a9eaf8c7cca3b36ee1cda005845bef80f8913ef141e44088e01cc45e197f5e", [[], [], [], [], [], [], [], []]}, 0x845) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:47 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:47 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:47 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x8) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000100)={0x100000001, 0xff, 0xff, 0x101, 0x3, 0x9}) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) personality(0x400000) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000080)={0x10001, 0x58, 0x8000}) 13:36:47 executing program 4: r0 = inotify_init() ioctl(r0, 0x7, &(0x7f0000000100)="b11f9d779891883ae0c8c15377574f374102fbf70c790610b4d6a90b0d75bb6065c02e68b291f6149023fd1fc6b05bca0a6567c868c40f59e802099fefb58033c54916e13c65757b2d0877bfbc767726010f4389f2e319c1") r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:47 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:47 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008914, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x20, 0x3, 0x3}}, 0x14) 13:36:47 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x54) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x2003}) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) setuid(r2) accept4$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e24, 0x2, @remote, 0x7fffffff}}, 0x0, 0x7, 0x0, "20dea6a2a20c02c955fa78d172558b03ed885383b2b85e93232e8b08ed68a561cbe5fa0614aa2e9c617f0ee85c47e774d3943d40704927f5524c2b3c7aef373328590101baa33a24b5721bc540dd2790"}, 0xd8) 13:36:47 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) 13:36:47 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:47 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000200)={'\xabU\xdb\xab\xda\xe4\x1e\xee1\xc5Z/sb', 0x20, '\xfc|\x83\x8d.\x1b\x05\x00\xdaP\"\xb4\x00O\x00\x00\x00\x00\x00\xb4\xf0)\xbc\xa9iSi\xbe\x84\xc6\xddM\xed,F~\xf1k\xa0\b\x1e\xce\x80/\x18\x830\xbd\x8f\xed@\x16\xf1\x97\x1a\xec\x16\x0f\xacq\xc3.kP\xb9v\xd7&\x99\x17\xa5\xfaz1z\xf3?\xb6\xca\b6\xcc\x8fD\x1b\xb5rH\x9f\xfeH\x80l\xe6}\x8d]:\xaa\x7f\x9c\x1e\xea/$\xa1}5.m\bG\xe5\xd6\x91\xcd\x12\x8b<\xbb\x14{\xc5\x05\xff\x89\xb5\x80\x8a\x97b\xd6q\xef\f\xeb\xa9\x18\x84v,\"\x89\'\xd1\xb1z7\t\xa2GF\x13\x06\xb8O\x19\x1b\x1am\xc3\xba\xa5\x99\xa4 \x0f%vx\xae\x86\xe5K\xdd\xd3t\x02\x8fw\xe0\x81\x8c\r5a\xdb\xfe2o\v\xaa&@&\xeb;\xd2\v\xaf\xf1M\x13q\"\x1c\xa42ZrtUsRq\x8edi\xaf\xdc\xd7\x01\a\xbfc\x17', 0x20, 0x20}, 0x107) 13:36:48 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:48 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:48 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:48 executing program 5: openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374658d5f753a6f626a6563745f723a68756765746c6266735f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a7330303030333200"/84], 0x54) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002340)='/proc/self/net/pfkey\x00', 0x40000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000023c0)={0x0, @remote, @remote}, &(0x7f0000002400)=0xc) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000080)=0x6) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002440)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002540)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@rand_addr="9e35cc46d7a16f5fb3b7026441566579", @in6=@rand_addr="0273036c428d9e1fd4be90e66be1d473", 0x4e21, 0x3, 0x4e22, 0x80000001, 0x2, 0x20, 0x20, 0x33, r2, r3}, {0xfff, 0x401, 0x4, 0x5ea0, 0x9, 0x6, 0x7ff, 0x3}, {0x7, 0xea24, 0x2, 0x1}, 0x40, 0x6e6bc0, 0x0, 0xf45c34db76e72efe, 0x1, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d2, 0x6c}, 0x2, @in6=@loopback, 0x3504, 0x5, 0x0, 0x2, 0x9, 0x85c, 0x4}}, 0xe8) 13:36:48 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x8000) clone(0x2180000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x11) wait4(0x0, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)}], 0x1) 13:36:48 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:48 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) r1 = fcntl$dupfd(r0, 0x406, r0) sendmmsg$sock(r1, &(0x7f0000000700)=[{{0xfffffffffffffffd, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)="b5b4e0f2c2eb5da71a2e43c24ee6196c276bf5b55ba0382cc3cfa53d8758e1a86510168b8b92ce193f16246a7c87d5aee0547947801b4ffb858a2ee0d74177c9a74694b82cfe5b8ead2c96d05daed632351a3d220dffb7796d6fd8d85c99f6a1841b987737b4031e415b5935bdf9d4f686ba5966a92b9f38610280d82d5636386f1ba6b355a62a9efba46be965d64aae6ea7e732f40914c4ceb79f746e52eef360796cf51f66df9c689e6fe3d9de907567b67bfdb2423099a29247d7d942cda3ed8eb6f9592ccf2a1a419608a9e5", 0xce}, {&(0x7f0000000200)="6cb80978d8ce79779b80b9d5a7c123fd8c3cb5d30f7d086f9d08f6144f1fc33089697b41dc9472fc3fc1cb211f7fd8aca26342938705b6a69c2e4e37f7a3fabd10af535c546ca33508cd3526112034358881f7146a1a7c7693296679fca5c3f6a2f8f1c7a0ccf857ef96be0d451a2289a417428536cc256a863af22e1792c1fabd317e0e14b67297e5d2ca7142bb476e", 0x90}, {&(0x7f00000002c0)="c1cad74a4c9f473f6bf08de4767fb5d4fb4bc9e8efc75c9c8e23d1cba830ec87ae44110b9fa4fae0010f383439ed30a104b57de7034419fe22fabc4700ee7493", 0x40}, {&(0x7f0000000300)="e611ed2b58c5902d23e67622e9edbdd9b6ec7c3f2b921625e6aeaa764dbc1ed7f60c6bb62aa68262a88845f6c21ab1a32b512188e69ce8152fb361a8959700f065c85a6cbe5124debf5878ff9b5d27814a3cd35123620f0304ac85c0ae0055cb12", 0x61}, {&(0x7f0000000380)="11282f6d1c5bab3d325b921531760e449a3046eea0667d1d26fdd088352ed8fc2376a3ef75bdc1a33c92189aa4e637db32ae9b", 0x33}, {&(0x7f00000003c0)="bae17043e437922fca01f057e37eb91a8aa9ff29671ed86e4ddc5d22eee54875dab0f3696cbbd0a1daa820b08aafe2b264ec17e1f9f69a1af1dccf984d98f3f58d0b4067ca6409ff1331d82464d1b12022786da2fe409796ce84d12278d8df7acda55d9f5f432b13991477adf92cf1623e1082929a41cf56ea", 0x79}, {&(0x7f0000000440)="bc32b23e7fed599ef0dc1b1246b1fd24660caca0071120785c5739f98c44e381ddbbd2c32ef84b68444f9fd0bc0beebde69684d69b939c9facc4be1d67cfda1040183e39c46e1e013dc4e9e8acb72a02f2856abb288272f031ef6da5cd4d0d53f5d25aab12a4975e2bbd2f730d16ee7f54a27f0c1f8796fecc4a00d0af91d2ca38c6ec02fa77764b10200941ee2ef081ce5eed58e235224cd75734d1f096220fd7bc2b5c7ecd3c872e1ec5749c9c1455c5e8a358252e0d47d60ff1d96e10ce32d1bfe46b345b0082fc766c2e435856cc3e118f95ee7ed3e133c2bbf895d23f1d3f875b553764fda46f24ab1dd0c0b2e9b53a", 0xf2}], 0x7}}, {{&(0x7f00000005c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000640)}, {&(0x7f0000000680)="9b281f7ed14c6ae48d6e9e2a32787fa1a932f454e9a467d8cbe26fe34020f632b5dc8d8fc0658a67f7ddf46d45f2b911f4bff4cffc00e62c52e3e9bb2de9792e", 0x40}], 0x2}}], 0x2, 0x40) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'nlmon0\x00', {0x2, 0x4e21, @remote}}) 13:36:48 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:48 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x54) 13:36:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:48 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000080)=@alg, &(0x7f0000000000)=0x80) r2 = accept$inet(r1, &(0x7f0000000100), &(0x7f0000000140)=0x10) write$selinux_access(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a64686370635f657865630000000000000000636f6e66696e5f753a73797374656d5f723a696e736d6f645f643a73302d73303a63302e6331303233203030303030303030303030303030303030303322000000a127cb5beab0996d195af1745153cc5bae4e7a2a177f230ee831e4d320981262b7430a94be148385ef8d55b425d79f297a310f548bcbd3a2eaa7b620fdc3726ea90b4af727d1dbee5ba75dbf380e4a781d85bcfe3926e200"/199], 0x65) fcntl$getownex(r2, 0x10, &(0x7f0000000180)={0x0, 0x0}) sched_rr_get_interval(r3, &(0x7f00000001c0)) 13:36:49 executing program 5: inotify_init() r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:49 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) syncfs(r0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:49 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:49 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:49 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765746c6266735f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a733020303030303030303030303030303030303030333200bc8388bc2f940e84a88a7255d6dc5ae68b301fffe2c68739e6d04eb6285b15b95b41b03242d7a23a0190a00884b51116ef75c56a6cb15365472b4cfd893d529fa1e3513fce8614af45f89e36380c18c3c52e1f2326507d1cd167b193b053551a2af5343e88eba44832f2472396d38c5ab4"], 0x54) 13:36:49 executing program 4: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x0, 0x0, 0x0, 0x100000000, &(0x7f0000000080)='bond_slave_0\x00', 0x2, 0x2, 0x401}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:49 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:49 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000080)) 13:36:49 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:49 executing program 5: openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) 13:36:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:49 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/member\x00', 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/user\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000140)={{0x1, 0x1, 0x0, 0x1, 0x2}}) write$selinux_access(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x14) io_setup(0x9b, &(0x7f0000000180)=0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000040)={0x3, 0x1000, &(0x7f0000000540)="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"}) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) io_getevents(r2, 0x4, 0x4, &(0x7f00000001c0)=[{}, {}, {}, {}], &(0x7f0000000280)={r3, r4+10000000}) 13:36:49 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") open$dir(&(0x7f00000001c0)='./file0\x00', 0x100, 0x24) write$binfmt_script(r1, &(0x7f0000000740)={'#! ', './file0', [{0x20, '/selinux/relabel\x00'}, {0x20, '{'}], 0xa, "eb415037204a2710a359d57ad5700e242ebc878692162703a322853286b34628e3f142e7598e557e53acad9c3c4e4946c4f2987f51b1162bc0f2e2d4beffdd44158c05f927a1c0951a6b5531213f3ea9eab52a8d9373af8696035c09e029a52513fb1e141942fb49f7f3f7c43f296552bda078e9608a495efc05563115392a3d4e2594cfd72f34f05781d02fe696bff1489ba881f97028049053026ecea26c7ca455374a9612eaeefc9cc65b31e5aaa6f1d80082409c561decfe5426f0eb8b850bd0853da4a301a17920df9a59aabfe729c5b536e29ffa70763cafd54d0b99aa9541e377dca5787b765120ff2ced3bda0feccb852b3ceb69d0ee638802e843cc56e4a2b554cf1e3cf1786ae6847204a10adc560e919e1388e7e015b18be36976ff1ee3c40fb8083e4bb4337c7725351d2ff82c4d93e990fe1cbd29cbddd0a2f29b4dbb31254b9eb6100ab374b32c16ce360cafe4cea0d1387bfcee002c05d390be0fb8f814e6b9ab3bb5d4fd6335500d7bec3b435282650ba015f069bb7f9dd05292f049d9ad1030869b614d9324b8fa24a13db8a97d7cabbe89dd42ced7267db3b5a23df8da4242c24a7ef4611e11ebbf90e7929bfd670e7d405b39cbfaf4fd5e2e74f5ca8fbd2d17c1aec652f161c25e359276ced62473b915ae5afa70a6997cc8d0c5c6ca5e7540b49d12a9b3896102c00473bfd75d8b0bf92cb171c87972f87ef7966bff50fb1eba990de0f7f527284d93319236a2e7ea2c05259bfd10624a14455381ac45dcfcfe0727e26dc80a2748ca84bc42a63d250960d2fb27555aa602a9ddb0bec512084c8d8aa12cd3d8481d795a16d644881bfd51db9f2ff801108744cf2ff5b074925177c4713a29024c46964a0f3cea5dcec1e85bb0aa5d33febdd395d1a800b8b74db22db704c562c2ea1141faefd9d022696f1f4d7069cd87299a64596a12961713bafe820c801033dd4235b1a760d9451e545e1d074425e7dea400d596475f0175049a63314cb19ed617d58014eeba326ef3c3ff7d2eafe8f3056aa602c67bf4894594f1ba62ef34254ac935efcfefc843236cb416302db6390a9a85aac65928d2545e971c6f6b4af8013833c21d3dfa73e189f86c7d00f7ad8a38d593d71b07c9c75ecf5be43a27004a28f37c1cbb18acd455337c175d4b0bbfa62a34be1d8e46098cc0360165467187d5199b2895016cd48f73e5f92abdebd3ce293512350086e4d64da4d102dd6695d66e427d9754a70302a7dab12920300aa503177a3512013e5f80e6c78c2b2b0b667e61a61d76e01890fd5af761af7e1c368c98a5eadbd6dd234c633e9fda360e68042aa28e930614e703559c3f20ebd5561c6a539c8e1a1bb7936e15c0112322f7823aa1e775f2dec01a01019f438e1ff1829044745594bc86e7b878525126acafe723ae8505d2cc136c173815a4d76242a3773292394637848bc601efbe9dcca698edb8439a830c20598c19cd99bfeecbc7f0ef35fea839337b5a2fdc368a24580ef9079031b524c2cf75f46102f7c511f352f15d70b5be7d08bddd1a1d507e7f7e88c0ca16bbf77a5539a8fae33e08f3d46a9747509a79b587680c2277501c6604cc1cfd6105ab7fd45e061c1623ba1782b31e7a955ccfe5706fe4d971eab5c6e8aa54a03f72d43987d6416e8fd508bb254374af69036bbabcd132407f29d8330dd020c1e72db27d5244654e271e063d5eb59e35df0bca85222d58e985b636e49207c8215e7775cc61f1a2147de4b8f39f83f35835281f95c5e063c48a54cf1ae15c6167dec5b409f65085ff7bec8b0519fabac599bfd04e20ec286bf2e70d13e9045077b08da5558ccfebe9ce639ea13cdf4db9b89f1e6f51a63db7a4b1946edfb5aa22a3f16c39b1a90a18cf3cf5cb5bd575fb1a764a157c316428864cc0fb01c241baa09321739338eb945328ea042944e1e89c6a198f97c4a4f3f3e5763bb5f2a791ba32247222046904cf0189f2fadbe823c629647adab8992d1d614bad939f6f372669b1036287cd30e53091e0fba7c7e2e649fe9470893b88e016aa21574ed9761c3e92de9fb6fcf02b52f702691f062148cc030021244643b4bdf47580dc4cf3dce20d715fd456781a8f5b3afc0d3dda239cd6f6b3297ecd3f894b365546a16a394eb81df0bd411343a78b5cb387463d3dbce8006d35f060368a559030bc884dcbada7d4a4bc2c4956c83e297e3ca0df92cc4439c3a18ffc0cf05a21dbddc7c2ab975f387153458045c4a317ff232a00b65f7854f229fb5b3e7cebddee095a7acde789b62db54609ffe98f647233547b00d818ad399528aa321fce82f1e2877c6ca88b731bb0923eb3e2b03e2ba528a63af4669fcc51e0a08ef45a97eb016c19d9eaeb34f0ce1a9b25e2733e0085fcdfede4e7bac040a2eb8064b00f68bb71de9edec453cd19831fc6e8097f8cee952a1095f41947acd8734148b9fbce851c6827f34bd75e28405d666ed476289f56e24facc87de144adc763cf5644e450ae7d4cf7d65eccf4970da34744717acaf50b6da40875ee22fdc03c1cdb982dd3482e6af0393a44d284177e3cc7b445cef168589632c901fca6b1ff8dadd131465eff560799a62a65b50de1c4e4f9a4cf36fdeacb2c2418d418d0d515de8474618a08c56a696ea577287748c98105d7a8cff4399e35a9a3562039f00cfc7868c3ab0508a62da47c257ef70dd0c10b623e9c401b8b18dc19596836f0485190f4d5c7cb98a62e1748d669b0dc84bfb56c60fd87902300686555f6a1e8e6dd7401423f9d730f587bf3acd4f6136b68da544aa40d48b76e5b18720c77043c23be7234804f5c3507161eb0b0a875ca3bb3d7b7a9e3918b6e2590f7555dbfb11c681697d67d4c00af2a05ae7593f8f4af51ebab3395c64b8b47e7087c77234d699bbf5440114a0083a82bea132913331e44b833f591fa6ef05a5e8b1539d472b1479092c1ce4a6607929e5874c1415bc7a9de6f21819c2dfd4dd0a933f4962dfb3a3f4639704ba2e81ce15ae75b776172910bbb9ec8c4ad6ad6a495d75e029d59b1c160f69ba1e172da66cf9f77022e367bb509a23dd24ddff0450c228be768f19de92a0148d77ac389305edaaefa936050b41ed57e2b10fa20404432a72cc861adbfc7daca6e1ad92e1dac5ef68a784a50a856bd40758bbc92111c560716e2ee5abcdcc610b5d32a8a0caab0c059b57a4e649adaba44c2d4d368ff503f9cd06126b544d082ce7dc05ef4ab937b4033f01dee1377c36234bb706ba79af6f7a804180d5d89d1748a9f59606a28435f2dcdf589557e51a73e1aca54035e5472cc2eedc9d59c1c8446464e829fe97ba8a9e9dae6e774117a12e4e8d74b1fd890979fabfa8dec6e78738bca4167b6d63bdb9f75043551a7155417d73fdf1a237753f99f6554e909b8fee8afa928ad569bc9519e80b3c84f31d4ab74d60d819e04b0ff68c21308f9446cf30a55fb1a034fcc62966c1f27ec13049fdc5e482fafc4d918d4b23f279be9957fa09869bc7a71aecd39568ebc1469a4c37d843ee64f0287f1b214535bc5e7a22f38b78f1364d8d7ed5199581de19bcdb043e374e0a108ab466e242c66736072da1daad1b02dc35b85ce87b2cb61a6cfe525b3eb4d7c611ea8f15f2eb0ead2baafae1c409eae615f835962b16ad288e2e6b7cb6de22c7f82ec3f2a0aa5db86ae55397b05abd41ead8006a473b82da8f26bd746d8fca82dc5120072bd64c1122a3de9974cde18cd40e98b572d23b3b904ba73d2bedfda24a4765fca45479ba798fc43c253082d579697b1d35be5e477a958473abf6182c94d11e231428112b6396649cc4bcec2f9cb59ded7e394a52742b9c4b388efb1314a06a2dca690738efc21813746a4a710366b238f5008ec48546b233670c8be18ca608f994c295df6db7e2a4c23b5e87e3902a6bcb7902e12c6927545d91afbcdc974d77b9aa1f45c5f57e1a2bd23db3568fbfa8dfaaa91835b931a62dc79ddf625094496627d3a7b80fd03d212e1d7f5ab6e50471c6f26768e4cc0cb7347b49050b93f3528c120a6b36df2617c2d3be2fad150d905c4e99d5a82bd38cc4548a480d4354a75f687aa68516082da533ddc1ee20013ea81c7f5cd9aa8913143d5c1d259f6e8e1fe973e585d1adefb013f07f19a00b44896efdac262514621a77afa868361866f776a2abef7dbe6233b0a2cb228f8caa553fc259a223e95ec235f599977536cc3510d18b30dfb2b6a5e2b8cd0c00bd72e4da5c7a6d46160516a1bfa0ad6d1787959c1ea3003154be3c664886a69e142619c5b32a1505538cdc2b9987da1c5bac4b0d59a06d0e87060dd6ac82f60e1f7a386b5f9fc3cb529d16de7b54d3cad39b595942603fb2b841e57ea8bc35e5fd35277e6de3ffd8141b861e45fe65e82a3a3e256c9a6c70350ded81f8b7ea15398530a5dee57f75067421d35e72869f67c3f78245c77772c8ee8f909a4294f5ce716d69c56908e044bcf57b55b8410422fc3d45481a57cb7e92fe0a435442bbba752b4877a24102987c02881c2f331c40a59231c9e2ffbde57f2f5c6287a8c28d43f9d205c96953eb4e3cc68cf3eb39ab62f6766266384b98a7304f0a04324cf808f770b11d226e0ba0b4483d003308a501fc9f53dc4ea96b4697fc1b191bbaa2c5e5ed16a43773dd4ad668fb29a4c9a23c374529499ea1ca0068fbc85f25c78a84f69d81853ca837160110eb5ced13c87871615b11a7d73fbcd787e1e2071ccfe41a1dde89226319b4cdd6fb5ec52f8acfcb06ec25d694aa5f7a0df1e628c1a3934d2f51c5b1c0ddc6bdaa5e900551ded394767bd45389a0e8b1e529ee222f7f027d1fc80ef92d90908c5ef2eae6ee5be6450521c539460172da74c61cad5585f9eea4be2ce65472b30e470f5ef8461e469735b3ae71772a6b5fc0a7c93440bc9cf43c17720ec33aa9c3b9947fcb0d79dcac64889adf718190820a987b13fc68437f65c33c10c15ebcd49c5c3f9390db07f26b5646fed04dbbb4a4c746a04e4d3e70ea3b7a01630b75ce4794735f24219a3c8898f611f5d610fb79242da92174077c099ecb6d77f08c466e955fd46c83cfa5c818b254ff6edd08b9edf75daa96ad52cddbc857cdec566e97388f4f2e94558028b0deba8721562b066d91fcd95594858e20f12b2a11767b0395dbf2747dfea096cfced448c6dbad6a2d449e14cc074ee4063f9fb626c7b72d4a0db905cac86bbf8ff7c1a16f860f351b38d0d4137364b2e911ad5d61879120632c04c78fb41f4b3f1aad1b626035070ef96421cb4eec661b232387fb5c3eae333e58ac04b42f39f39ee4d7b1ca3a5dfc3965898ed74671dd917b242e770be7b2d97f46f8a598b7802b079f545cb727f0aeeb5e0606506a0da749874c4033d0d3fa62f0f3ef703acd3b37e6d23ad230df4d45dc781b7c4251f24a0d3402e7886d1f5744846a7dde7fc707062f30db5072c7accc757b3066d54b205090232535ca20f002ac934ca6aa1a61c304844279b04449e1e47a4296dce85297c1f7cf2620026b9f158cd9aec7bfa2e52a8a723362bb938d09649c322c0c671b5ed7fc88b71a68668d3d689a05be16df730e4fa90f511a78f9e4d63a38b25adb663d6cfa83e0686ba3ee7a40d8cfb647acdb9593069bfdb86acce37110f0db8ae2200a9397044b33056fc5584a7ebcc460ad31689c655dc7ae81c3e748fcbc85684e293d48d317c17fd3dc784706d77ca708fbc1f4503ef530d74a46e4667f7a5252a3c676f8e509949d3c04188f1e73e2ac10db9"}, 0x101f) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x4801, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000240)=0x9) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="020fdc2f5d5b65c7ff3cd8eebba5153ea3bed60fb893581b5fda4bc112e2ee61981cd1d832306d3f9816268edf1fd383a2f3448937d85653380a66a1e11436d26f49d7eea03c45413290ffec2946f61524bfa558305fccef0b6e8b680c2c79a28756cf733bbe25f968c8afa1322f30048048891c3840804ebc2ae0c842b2798b883ef56b595932876c7d52af4d332830398bf88e", 0x94}, {&(0x7f0000000000)="4bd9253ef114bd5a7dc960d63dbbdc100ef868dbef263c8826f117471010f6449f82d606143a0bac9001a99e6a7d1e409354a95588c999a6f9ec9fe44a", 0x3d}, {&(0x7f00000002c0)="6e16f1f1f622dfd4782f78e6e283aafbe49351142502cd875346fcb51ed1a05955276855d840253d682310571dfd71f740736a00d44fd0f04d86e6289e5bf6610e7ecfe6531723d9a54c77ce325c729ef08fbdc16c079576e1d11abdb92bf1f3506e7f43ec915b506755238e44be7270c80e52b73c9cf5474f20d6f9d5af712b007637d92ac2f191318072189c8d7b6017fcd9959e0b0f90e7be7acf3d6162d4667dc7582bc28f48fab7138f82db91719c8b371e6e0acae6d41410b4e9aaa958f50ce45bf6ae8edce1d3c8ae3b8cbab4789e5da90a69fd731aa6c874172712", 0xdf}], 0x3, 0x0) 13:36:49 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:50 executing program 4: r0 = memfd_create(&(0x7f0000000100)='!}/%)\x00', 0x5) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:dhcpc_state_t:s0\x00', 0x23, 0x3) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000200)=0x8) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x400000, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x20000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00032abd7000fbdbdf25090000001c00020008000400200000000800030004000073b34e000800030048f600000800050001000000080005000700000008000500080000001800030014000600"/90], 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:50 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:50 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000440)={0xd, 0x0, 0x9}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x7}, [{0x2, 0x4, r3}, {0x2, 0x4, r4}], {0x4, 0x3}, [{0x8, 0x2, r5}, {0x8, 0x1, r6}], {0x10, 0x2}, {0x20, 0x1}}, 0x44, 0x3) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:50 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:50 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:50 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)={0x6, 0x2, 0x7, 0x0, 0x0, [{r0, 0x0, 0x4000000000000}, {r0, 0x0, 0x7}, {r1, 0x0, 0x93}, {r0, 0x0, 0x5}, {r0, 0x0, 0x8000}, {r1, 0x0, 0x92}, {r0, 0x0, 0x2a35}]}) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:50 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:50 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:50 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:50 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:50 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) flistxattr(r0, &(0x7f0000000080)=""/163, 0xa3) 13:36:50 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000), 0x4000) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:50 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) flistxattr(r0, &(0x7f0000000080)=""/203, 0xcb) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:51 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:51 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@loopback, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@local, @in6=@remote, 0x4e21, 0x80, 0x4e22, 0x0, 0xa, 0x80, 0x20, 0x3c, r3, r4}, {0x0, 0x76b, 0x2, 0x80, 0x77b5, 0x9, 0x7237, 0x8}, {0x3f, 0x1f00000, 0x6, 0x6}, 0x5, 0x6e6bb0, 0x0, 0x1, 0x1, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x1c}, 0x4d3, 0x2b}, 0xa, @in=@remote, 0x3507, 0x3, 0x0, 0xffff, 0x0, 0x0, 0x9ec}}, 0xe8) ioctl$FICLONE(r0, 0x40049409, r1) fcntl$getown(r0, 0x9) ioctl(r0, 0x401, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") pread64(r0, &(0x7f0000000040)=""/125, 0x7d, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:51 executing program 5: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0x7, 0x10, 0x1, 0xffffffffffffffff}) write$binfmt_aout(r0, &(0x7f0000000200)={{0x10b, 0x0, 0x7, 0x1ac, 0x2ee, 0xffffffffffffffff, 0x107, 0x506}, "c9ed9adefd0fc3bc90842296d547f68264c1c38bc9f1126b915b2c4e09d35297aa2ca390c02d86720c1083560a7b3a1e76565b355e8a36ea176bfd3fdc44fa661ec9e7c04860e911b281c645961740f785d3bb2d0a0983de1f78e2314da52acc08d2608d95f7031e7f9e2ac5cb5a824b6d14da51a7c503d647e831bbd4baa33b4c5a400a3dae26df292ce514d23666e68dc94e933e1f4ae224285a385a2af06b558cf1d7a4d3695e3240d175ff90464b3bdda05b92a19e7cdc50f3994e43b51f9b20db4690f0448ae5019a01d58ef90fe730590fca17ba685a5d5b2771ff6ab74e8f35c5ef0265fdd87203f90fc0557cf16bf5", [[], [], [], [], [], [], [], []]}, 0x913) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:51 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:51 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:51 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) r1 = gettid() ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000080)={&(0x7f0000000000)=""/40, 0x28}) socket$inet_tcp(0x2, 0x1, 0x0) 13:36:51 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:51 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000001c0)=0x4cf1d696a5c80f9a) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$inet(r2, &(0x7f0000000100), &(0x7f0000000140)=0x10) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:51 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) write(r1, &(0x7f0000000080)="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", 0xfc) write$selinux_access(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765746c6266735f743a7330207379737465045f753a73797374656d5f723a6b65726e656c5f743a733020303030303030303030303030303030303030333200"], 0x54) prctl$PR_GET_TIMERSLACK(0x1e) signalfd4(r1, &(0x7f0000000000)={0x7}, 0x8, 0x800) 13:36:51 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:51 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:51 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) socketpair(0x3, 0xa, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) fcntl$lock(r1, 0x5, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x0, r2}) 13:36:52 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:52 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x6) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000100)={'raw\x00', 0xca, "746b7474e8cacbc5fdefef846d24776067d6849386d58f1f00d156604f7864947c4dd207b78a058adf0057cd8e83b3a285d013fe697ade76f7caab56c3c836a3a8435bc4caf15179bfb8f0fa8393c69d61bcd5f43b156671b52cd732fd192a978604b5980ea89ada0a17ce1cd5bbe58caf588af6cfbd60ccbad83ce320dd99b631ff498454cdad2ae2a51a3264d9cef6c2499a00bac018bdb635cd74416e1fd2d0944ccad6ccb436a7ad87342cde6805e163630f9a1fd05ed0c98c8d15dd88f339f383a0214401e8f6e1"}, &(0x7f0000000080)=0xee) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_INPUT2(r3, &(0x7f00000002c0)={0xc, 0xe1, "67f871059c62112f82b295262ec815ddb463186363b54126dc65a8bb218e70c376f6828e46842353110a50c506b7e79ba73142e2b98498f1654a2256382c513c9c0283700872ec405d5e811d8b476424670f9aca70d3265693515749aaddeda7d1c042f1c684e50ae5e1ec8c1cef437f49708b59282becb7671de04943d8fbb25222c8603b41356a350dcc702938478d1a11c20cc6973a5c07768c8ae1eda21838353f61de4008e09815a732614d73d39f7f28f385a2da38ca588d1ee2b8a4715b0907b7927bf601e0475efb4d474c21bb3716eaa1960d14db7284655fe4e2d420"}, 0xe7) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x58a, 0x4) 13:36:52 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1f, &(0x7f0000000080)="85a53a14ad16a87a18ad3b0abca4ff171fbe9199a30d9ca86970dab8990f8e3ddc74252925c4c5be3c06b5f1a7a5b3edf9f79d65a0d8e7a8c1aa9e0d01cb77052d0dc4d0c79b813eafa7001868a9dc1023089fa860c07c757b1b47a76c8e3bfb92b73ba256b8a1f2cd93c3e8042aa6eec0d6e6fb4761a52cdbdfc0760241f4bbf982882c7a308f3031edcf58a62052be8486bebb612cdf4539203fbbe23438", 0x9f) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:52 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:52 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:52 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$revoke(0x3, r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = open(&(0x7f0000000000)='\x00', 0x20040, 0x38) write$9p(r2, &(0x7f0000000100)="ae75b05f035a1c2d02c930e426e24896810f71c673218352e53db8abd765520357c517972b53df6970afe2ea3f17050a21fffcf7c64c4999e301560bb3a88639ade09fde55532b45a4cf022f2132ea939a048ffa0639288f1614e5f7cd9c14b7832d1acf38c8462029b3899ee5cfc80bf9550d9dc68a88c0f1ae8e10decd4ec56191568ce1ae7b25cbdaba1075dda983bf0f0d72ddb7113c0a43286c4f4a6dcc8a4418450edd3c3837f86ac38d87b60c6851fd8bd37f44664b52bd1ba03aa4b6aeb57d9b347cba9dbaacb6f9a9801a881e98a02cde4406", 0xd7) 13:36:52 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000001500)={'system_u:object_r:tmpreaper_exec_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x6}, 0x4a) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) readv(r1, &(0x7f0000001480)=[{&(0x7f0000000100)=""/230, 0xe6}, {&(0x7f0000000200)=""/79, 0x4f}, {&(0x7f0000000280)=""/75, 0x4b}, {&(0x7f0000000300)=""/30, 0x1e}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/98, 0x62}, {&(0x7f00000013c0)=""/153, 0x99}], 0x7) write$selinux_access(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="73797374626d3a6f626a6563745f723a68756765746c6266735f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a733020303030303030303030303030303030303030333200a8882731e266ee945288844fb325f590ec300dafdf85ecbc1ea7"], 0x54) 13:36:52 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280), 0x0) poll(&(0x7f0000000000)=[{r1, 0x1210}, {r0, 0x8108}, {r0, 0x3520}, {r0, 0x6696e4c95e49c948}], 0x4, 0x1) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:52 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:52 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:52 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="60ed628d367b9019ac17a9eed9fb182c2fa5275e2695a479f070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:52 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:53 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:36:53 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000080)={'icmp\x00'}, &(0x7f0000000100)=0x1e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:53 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a6869b0eabb6c6266735f743a73302073797374656d5f753a73797374656d5f6709e05a425814329c14df447cc91e723a6b65726e65095f743a733020303030303030cf7ba1303030303030303030303030"], 0x54) 13:36:53 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:53 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280), 0x0) poll(&(0x7f0000000000)=[{r1, 0x1210}, {r0, 0x8108}, {r0, 0x3520}, {r0, 0x6696e4c95e49c948}], 0x4, 0x1) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:53 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:53 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) 13:36:53 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_pts(0xffffffffffffffff, 0x200) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x3, 0xffffffffffffffd6, 0x7}) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r2, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 13:36:53 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:53 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x3, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x2, 0x4}, {0x7, 0x5}, {0x2, 0x3}, {0x4, 0x5}, {0x9, 0x3}, {0xb}, {0x9, 0x5}]}, @var={0x0, 0x0, 0x0, 0xe, 0x1}, @ptr={0x8}, @fwd={0x10}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x3f}}]}, {0x0, [0x0]}}, &(0x7f0000000840)=""/200, 0xa7, 0xc8, 0x1}, 0x20) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x10000) r4 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@un=@abs, &(0x7f0000000100)=0x80, 0x800) recvfrom$unix(r4, &(0x7f0000000280)=""/125, 0x7d, 0x2020, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbcq\x9a\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98q\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00', 0x2761, 0x0) write$cgroup_pid(r5, &(0x7f0000000080), 0xfffffe38) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x0) gettid() bind$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6000, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RVERSION(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="1500000365ffffff00e7df070039503230ee645a1f"], 0x15) sendfile(r6, r7, 0x0, 0x10000) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0, 0x401, 0x0, 0xe69, 0x9, 0x1ff, 0x0, 0x3, 0x7, 0x1, 0x0, 0x23, 0x401, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000001, 0x80, 0xffff, 0x0, 0x1664, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xdbc1, 0x200, 0x0, 0x5, 0x20}, 0x0, 0x6, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000002d00)={0x3, 'dummy0\x00', 0x1}, 0x18) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000000)=""/217) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000080), 0x1ae) 13:36:53 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280), 0x0) poll(&(0x7f0000000000)=[{r1, 0x1210}, {r0, 0x8108}, {r0, 0x3520}, {r0, 0x6696e4c95e49c948}], 0x4, 0x1) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:53 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000380)={'system_u:object_r:hugetlb\xe6s_t:R0\xed\xc8\\\x8e\x9a\xc1\xbe\x8e6\x01\xceVr\xb6|\xa2D+\x81\xbd}\x90p\xa5\x8f\xa2M_\x19\xb3\xdaT\xa9`\xa19[KL,b\x0f!\xd9\xa4\xb5KW\r\x8d\xd9k\x1dl\x9duW\x80\xa4\xf8G\x97P\x0f\x11\xdb\xdb\fh\x8b\xad[J\xb9e\xaf\x013\xe3\xca\xaa\x00\x00\x00\x00\x00]\xdb\x88\xednz\x13\xbd\xfe\xb4\x9aRd\xe6pm\xe6\xf4\xc9e\xe6\xf2\x16g\r\x83a\xf8lb\x1fz\xa8\",\xc7Q\xa0G\a7\xaa\t\x90N\x19\x98\x8c\x96S\xa2\x14\x9c\xfeAp4\xf0.\xad\x83Q\x18q\x87 \x8f\x06*V\xc7\xf0\xb6\xeb\xfe\\8\x92\t\xb4r\x85\xf8\xb1\xd4\xb8\xdf\xa7D9\xad\x00\xbcO\xd35\xae5\xcd\x84\xe2`|\x02}\xea\xb0#Y\xef\xc5sI\x91\x8e\xa5}\xea4!\xfb\xa9\xedb\xacn9;\xa6\xd4\xff\xe4\x87\xde\xb63C\xe2HC]\x1f)\x9a\xc7LCQZ[\xccOm\x88iq\x824\x91x\x00'/294, 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x15a) 13:36:53 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:36:53 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f0000000100)='\x00', 0x1, 0x3) write$UHID_DESTROY(r1, &(0x7f00000000c0), 0x4) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:53 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280), 0x0) poll(&(0x7f0000000000)=[{r1, 0x1210}, {r0, 0x8108}, {r0, 0x3520}, {r0, 0x6696e4c95e49c948}], 0x4, 0x1) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:53 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:53 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000080)=0x1) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000140)=0x1) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c6530202f73656c696e75782f72656c6162656c20657468d84e5d2327282c776c616e3020626465760a3ac62465"], 0x36) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:53 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:53 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) sendto$inet(r1, &(0x7f0000000040)="3b12640affee0c647ad850a28f151864fb213caaf09ccf3b43bc85f2f933dc75fc3d657c2105c1a04e20c7", 0x2b, 0x40000, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x12e00000}, 0x10) 13:36:53 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280), 0x0) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:54 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000080)='/selinux/relabel\x00', &(0x7f0000000100)='user\')\x00', &(0x7f0000000140)='md5summd5sum#!*keyring*.-[lo\x00', &(0x7f0000000180)='+{\x00', &(0x7f00000001c0)='/selinux/relabel\x00', &(0x7f0000000200)='/selinux/relabel\x00'], &(0x7f0000000300)=[&(0x7f00000002c0)='\x00']) 13:36:54 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000100)={'sys\xb8,\fv\xf5\x16\x87\xf36z\x03\x12\xe1pt\x1f\x00_\x89:\x03\x00\x00\x01\xff\'t:s0\x00\x01', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x57) 13:36:54 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:54 executing program 5: openat$selinux_member(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) 13:36:54 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:36:54 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:54 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:54 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f720d737368645f6b65795f743a7330207379737465a0950b1c0965add2656d5f723a6b65726e656c5f743a733020303030303030303030303030303030303030333200"], 0x53) r1 = dup(r0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000000)=0x4) sendto$inet(r1, &(0x7f0000000080)="d19996942a959516d294cb96ced53f4500aa98af3687b4c269589fef2b49a4c688437961ad021991bcb819c5ac8908fbcef9a4f029", 0x35, 0x1, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) 13:36:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:54 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:54 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) r1 = dup(r0) ioctl$TIOCSTI(r1, 0x5412, 0xda) 13:36:54 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:54 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000080)=0x26) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) dup(r1) 13:36:54 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:54 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x40000000}) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r2, &(0x7f0000000300)={'system_u:object_r:hugetlbfs_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x3}, 0x88) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000140)) socketpair(0x11, 0x80000, 0x1000, &(0x7f0000000080)) 13:36:54 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = dup2(r1, r1) io_submit(r2, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f0000000080)="5971a8663208cf7b25f62a8558365029484c666776b01185f33666b3c0b8b5603caa8a8505024275e4b7b1188330f06251e26d990e9edd5a", 0x38, 0x1, 0x0, 0x2, r3}]) 13:36:55 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:55 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:55 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'systu:sys~#m_]:kernel_t:s0?I\xd9\xdaK\xee\x1c\x9f\xaa\xa8\xb8\v\xd5\x8b\xbc<\x94\xc9z\xdf\x0e\x1bv\xa8\x9a\x11\xe4\xb2Xqe\x86\x01I-\xf1\x11|\xfe\x92\x1bt\x9d\xfe\xc1\xc0\xa1\xf3K+V\xec\xaf*\xb8\xe8\xcd\xab\xeff5\x94\xee\xd0\x16| >\xdd\xad\xb5k\xf8\x93jQl\xf4\xf5vQ`z\x9a\xb7[m\x18-P\xdb\x11\x94\xa5\xd4\xb2sJ\\w\xfcH\xd0pox\xe3\x19\xd0b\x85w\xc6\xa5\"n\xbf\x0e\f\xbeq\xe2q\xf4j\xa0\xc4o\x8c\xffy\xd6\x13', 0x20, 0x20}, 0xd6) 13:36:55 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:55 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) r3 = dup(r0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000480)="849720c3539491e4ed7f0af0f2080242", 0x10) socket$netlink(0x10, 0x3, 0xd) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:55 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:55 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68756765746c6266735f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f743a733020303030303030303030303030303030303030333200bda0a0ca2bcc4df91ec5a5e7f65dca5d141d3f8968889a888026d4c6922497057750054ce6657044b2afe8f77e2e651a40d50cad9bf18ae2fe1c85369e85db6fd7c163d6d9703ae1d1a2b01b20e40e3d7f2d2ce2e34bd0029599235d93235d5cff8e4e71d6028f76f1945d666cca1f257b29acd8"], 0x54) 13:36:55 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:55 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) timer_create(0x3, &(0x7f0000000080)={0x0, 0x35, 0x2, @thr={&(0x7f0000000000)="d509a8f9b8b7a903e8e95929c55488a58b36fbba9f87d570090de229ad3660013cf01875ecf3a62ddefe938ce9", &(0x7f0000000100)="2cff5eef0e42849a209a418dcff266eaad3537d6386164106835fe12439edc51fdcb21c7edb6189bd8eca5e779f32dcf23b1ad6d8046a66e4849d8c6055c6ecbab87c21dcbdc068d71ff3825793f56cd45ef6c89acf9ba1cfa45f7291e45ff03fec4ee1676bdd1affed4508aa187c8122947bdb41e58a711c6c0b1faf02627d263b1d9dcb0a282b021f4bc2c6d27f75077d5aab749c7347cc218417e69c7fd5575821e0f31d2f9dda94d8fe02a1b6e3a9333aeabe2d04f38762074b15b97"}}, &(0x7f00000001c0)=0x0) timer_gettime(r1, &(0x7f0000000200)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000340)={0xffffffff, 0x1, 0xea8a, 0x10001, 0x4}, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='map_files\x00') write$P9_RRENAMEAT(r4, &(0x7f00000002c0)={0x7, 0x4b, 0x2}, 0x7) 13:36:55 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:55 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:55 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) 13:36:55 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:55 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) splice(r0, &(0x7f0000001380), r0, &(0x7f00000013c0), 0x5, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x9, 0x5, 0x8, 0x0, 0x2, 0x80, 0xa, 0x9, 0xd34, 0xc8, 0x2, 0x8, 0x7, 0x3, 0x7, 0xff, 0x46, 0xc68, 0x4, 0x7, 0x8, 0xa00, 0x7f, 0x4, 0x3, 0x0, 0x3, 0x7, 0x9, 0x0, 0x6, 0x6, 0x7, 0x825, 0xefb1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1, 0x184, 0x7342, 0x2, 0x924, 0x9, 0x3}, 0x0, 0x4, r1, 0x1) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000001400)=0x1) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000080)=0x6) pread64(r0, &(0x7f0000001280)=""/197, 0xc5, 0x0) 13:36:56 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:56 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = getuid() fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x8, 0x6}, {0x9, 0x7}], r2}, 0x18, 0x1) 13:36:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:56 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003e80)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getdents(r0, &(0x7f0000000200)=""/181, 0xb5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000003ec0)={@mcast1, 0x9, 0x2, 0x1, 0x8, 0xffff, 0x8001}, 0x20) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x2010, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x240, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x26, 0x8000, 0x1, 0x1, 0xe000000000000000, 0x8001}) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0xfff, 0x8, 0x2a, 0x5, 0x81, 0xab}) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='system_u:object_r:hugetlbfs_t:s0 system_u:system_r:kernel_t:s0 0p000000000000000032\x00'], 0x54) 13:36:56 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:56 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:56 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x7319db84, 0xc4, "fc8dd071ebfd4b15194ebbd376ca36076f7592b51900a128df3e66ea9aeaaf7eb150134bb3e2db1443ed1fa9cb0aafea641e5bf2a0264518e8a21d1ec184308df4fb30321fbc7adf8029244b8a4e397035b1505c694a499792c80aa7109981e89b01697eeedd457558f21f8195b1dc978cb017baf18ea75a5ee3ea18933aa07b95bc80ce68937fdf82db07a66bce01c2bde4bd3e4719255babb12e01c1b511e55c7b1825ff42b65493498c022c916c69d8afde4390390b51b1d3c128ad465b6568417d26"}) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:56 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000140), &(0x7f0000000200)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0100700093c1e05964344f496ee085bcbdae13a8df7d01008e1f6f6187b39b362678a650860cce3a882783cebe2b71d0efdc6c143b0ba0f06c5f42918ea60df108eb37a5b89d766501") writev(r0, &(0x7f0000000300)=[{&(0x7f00000002c0)="dd"}], 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x1, 'veth0\x00', 0x2}, 0x18) getsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000000)={@initdev, @dev}, &(0x7f0000000080)=0x8) 13:36:56 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:56 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000004c0)='TRUE', 0x4, 0x442e211bde2c6452) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) write$selinux_access(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="73797374656d5f753a6b626a656374f6763d2319b00a970ba6425f723a68756765746c6266735f703a7330207379737f07000000000000737465595f723a6265726e656c5f743a6330205330303030278c1a10c09a13820e85013d3363c55859c65bd9e8112abd17"], 0x54) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'sec\x06\x00ity\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}, &(0x7f0000000000)=0x269) connect$unix(r1, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000003c0)={{0x73, @broadcast, 0x4e24, 0x0, 'ovf\x00', 0x5, 0x1, 0x2f}, {@multicast1, 0x4e22, 0x4, 0x4, 0x8, 0x5}}, 0x44) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) 13:36:56 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000108912, &(0x7f0000000340)="11dca50d5e0bcfe47bf070c5990a783f441e391f4252096dbdb76fb99e3e48a2205a1055d7dfe0bde136ed6a76246c3cde3a182a7d82f948af2b13398b2648bcd4a2ae7069fc18cd72b6a063484fbf63fbd068bd8396b08d6605") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)='/selinux/relabel\x00'}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f00000003c0)=""/188) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x7) 13:36:56 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:56 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:56 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:56 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000080)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u$system_r:kernel_t:s0', 0x20, 0x22}, 0x5353) 13:36:56 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fsetxattr(r1, &(0x7f0000000000)=@known='user.syz\x00', &(0x7f0000000080)='cpuset\x00', 0x7, 0x2) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x59}, 0x28, 0x2) 13:36:56 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:56 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:56 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000080)) write$selinux_access(r0, &(0x7f0000000240)=ANY=[@ANYRES16=r0, @ANYRESOCT=r0, @ANYRES32=r0, @ANYRES64=r0, @ANYPTR64], 0x2d) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) 13:36:56 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:57 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:57 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a68b25d70e76c6266735f743a73302073797374656d5f753a73797374656d5f723a6b65726e656cdf343a733020303030303030303030303030303030303030333200"], 0x54) 13:36:57 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x10, 0x80000, 0x1ff, &(0x7f00000018c0)={0xffffffffffffffff}) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000001900)=""/40, &(0x7f0000001940)=0x28) gettid() ftruncate(r0, 0x11048d7f) setxattr$trusted_overlay_nlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='trusted.overlay.nlink\x00', &(0x7f0000000380)={'L+', 0x8000}, 0x28, 0x3) ioctl(r1, 0x6, &(0x7f0000000140)="11dca50d5e0bcfe47bf070cd3497e9ba60ad654832ea0848f5b0ee7466483150349283882f3d3b99087e51e68d4e7872b672928bb2aedc4bc984750872c9b23e2677cab2d1e8d368e745299f48b1ba0eeca29bdc019fb7b15bb8f0a86f2d6020d42777722c248cdd3d69f2b28f692196be9f06d51e30de50d1f5d9b3a17d3902b3b1607b489594a6727e188e61a0b1d8f5f4000000000000000942cfba") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/hci\x00') r5 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000200)=0x1c) write$binfmt_misc(r5, &(0x7f0000000240)={'syz1', "035f4eb080542f4fb3b071f69c20fa4f82a14530bff04b"}, 0x1b) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x8, 0x3, 0xb, 0x1c, 0x1, 0x59, 0x4, 0x88}}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000002c0)={0x9, 0xfffffffffffffff7, 0x6, 0x10a000000000000, 0x101}, 0x14) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) 13:36:57 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:57 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:57 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:57 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', 'nbd\x00'}, &(0x7f00000000c0)='{\x84mime_type/\xa2\x00', 0xe, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r2, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) syncfs(r0) 13:36:57 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = socket$inet(0x2, 0x80806, 0x2) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) 13:36:57 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:57 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:57 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) 13:36:57 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:57 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:57 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:57 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:58 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:58 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:58 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") lseek(r0, 0x0, 0x2) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f00000003c0)) vmsplice(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)="b06cb46edbe0e2e5f3844f282d24850fd6d9b804e247a6e89b830ee8bbf6181463cf370628fd0e12103e962eb9d97c5427592d11112809a956abf79d7d5422331a8b3e292ebfe2ef2c8156d4ca192b29b54aea683bce85f587787f73d15865cef8821adab5ab3fca0919560e23ff81b492281479ef98f6e1b1810d6d178edbf1ad837046c3853bbb997c60c9e8526bd7a74c334f4b7dace1e08a485db58c3656ef77af8335b66cc3cf1283e1b56cbcf3efe472a3141cbc1398033cee8fa864e2f309338c4f17462618909ba1592d95d05e93ae49ba1f162989db07ba05a05ff6ad05ec", 0xe3}, {&(0x7f0000000100)="fcf989fc2faaa49cdc911987bb6c4aaa174484d97020687a2864a760f417a88da12053676de7cdfd25f22c1ad830a48b1aaf481c57984072957a9115fb6d2b5d2c927b40130e9caf2b62b7dd40b45f4c", 0x50}, {&(0x7f0000000000)="7a0875025b9f349e27", 0x9}, {&(0x7f0000000200)="07922358edcf643c0f1e019910f468998127b4907963b1d464e8921806ee0b9659b7361b9cca8d47bb1ded54449b2a452be07cc17f21d4d2877f6bb44319685b217c75b4c121252659f6d8c5b51a7188acdc9ee18ff7a8ff", 0x58}], 0x4, 0x1) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:58 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:58 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:58 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:58 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:58 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = dup2(r1, r0) r3 = dup3(r0, r1, 0x80000) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x7d, 0x8, 0x2, 0x0, 0x9, 0x2, 0xe, 0x0, 0x401, 0x7, 0x1ff, 0x1, 0x401000000, 0x7ff, 0x9, 0x8, 0x2, 0x3, 0x200, 0x7fffffff, 0x100000001, 0x1, 0x9, 0xcfee, 0x0, 0x9, 0x7f, 0x4, 0x0, 0x6, 0x1, 0x0, 0xff, 0x80000000, 0x8, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x67, 0x4, 0x4, 0x2, 0x9, 0x7}, r2, 0xc, r3, 0x7) 13:36:58 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:58 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x217) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) 13:36:58 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:58 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:59 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:59 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:59 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:59 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:59 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:59 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = dup2(r1, r0) r3 = dup3(r0, r1, 0x80000) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x7d, 0x8, 0x2, 0x0, 0x9, 0x2, 0xe, 0x0, 0x401, 0x7, 0x1ff, 0x1, 0x401000000, 0x7ff, 0x9, 0x8, 0x2, 0x3, 0x200, 0x7fffffff, 0x100000001, 0x1, 0x9, 0xcfee, 0x0, 0x9, 0x7f, 0x4, 0x0, 0x6, 0x1, 0x0, 0xff, 0x80000000, 0x8, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x67, 0x4, 0x4, 0x2, 0x9, 0x7}, r2, 0xc, r3, 0x7) 13:36:59 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:59 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="1e0000005e0bcfe47bf070140805b0b519b164257a13b8d69c7e100879cdc17aeb6cd16b0125896b6b88caf2ed885f7d8b40b59b5e8a15a9ab5b4cc90c549572eb943b464901d32551d4ecda2b8c8afe4c1eea467e235b632bae3790780000000005d4673d362e7fcebe93cd382235aec2875efd40ab10bcee476bc3cdaf364e8379ceeca0ad23bff0109bae") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) socket$packet(0x11, 0x2, 0x300) fcntl$addseals(r0, 0x409, 0x4) 13:36:59 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = dup2(r1, r0) r3 = dup3(r0, r1, 0x80000) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x7d, 0x8, 0x2, 0x0, 0x9, 0x2, 0xe, 0x0, 0x401, 0x7, 0x1ff, 0x1, 0x401000000, 0x7ff, 0x9, 0x8, 0x2, 0x3, 0x200, 0x7fffffff, 0x100000001, 0x1, 0x9, 0xcfee, 0x0, 0x9, 0x7f, 0x4, 0x0, 0x6, 0x1, 0x0, 0xff, 0x80000000, 0x8, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x67, 0x4, 0x4, 0x2, 0x9, 0x7}, r2, 0xc, r3, 0x7) 13:36:59 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:59 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = dup2(r1, r0) r3 = dup3(r0, r1, 0x80000) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x7d, 0x8, 0x2, 0x0, 0x9, 0x2, 0xe, 0x0, 0x401, 0x7, 0x1ff, 0x1, 0x401000000, 0x7ff, 0x9, 0x8, 0x2, 0x3, 0x200, 0x7fffffff, 0x100000001, 0x1, 0x9, 0xcfee, 0x0, 0x9, 0x7f, 0x4, 0x0, 0x6, 0x1, 0x0, 0xff, 0x80000000, 0x8, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x67, 0x4, 0x4, 0x2, 0x9, 0x7}, r2, 0xc, r3, 0x7) 13:36:59 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:59 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:36:59 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000080)=0xc) ioctl(r1, 0x100, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:36:59 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) dup2(r1, r0) dup3(r0, r1, 0x80000) 13:36:59 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:36:59 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:36:59 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:00 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) dup2(r1, r0) 13:37:00 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:00 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:00 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:00 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/102, &(0x7f0000000000)=0x66) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:00 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:00 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:00 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 13:37:00 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x62000, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000080)=0x3f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:00 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:00 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:00 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:00 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "9880c93b995c4bd6ddcfc34f43e03f96"}, 0x11, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) unlink(&(0x7f0000000000)='./file0\x00') 13:37:00 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 13:37:00 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:00 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 13:37:00 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$notify(r0, 0x402, 0x2e) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x1b4, r3, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x104, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x493f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) 13:37:00 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:00 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:00 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:00 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) 13:37:01 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:01 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:01 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66696c653020766d6e6574315b76626f786e65743125295d2f24252d6b657972696e67206264657660292723707070310a94fd076a04c7cac3c7ac96fc7c454d9d0c00cf100bc14950eb7fba3abe5646c44a9a28fc53857e5e06c9aec56aa922f4662a1b1545e58d16fde00872b7b4fe57c0971fb8a58e8b0e13cf796741fa53bc6ff4fe41dace59df63588911415d4585adbf20d9bb31aa4afdf654ff2b"], 0x95) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) r1 = fcntl$dupfd(r0, 0x406, r0) recvfrom$inet6(r1, &(0x7f00000002c0)=""/224, 0xe0, 0x2001, &(0x7f0000000040)={0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x29}, 0x1c) 13:37:01 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) 13:37:01 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:01 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:01 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:01 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) 13:37:01 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000100)=""/68) r3 = dup(r1) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000000)={0xfffffffffffffffd, 0x7f, 0xfffffffffffffff8, 0x6b, 0x3, 0x3}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, 0xffffffffffffffff) 13:37:01 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:01 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80080, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e20, 0x1, @rand_addr="62d7ecf8fc0001a33e1f8f619712910a", 0x401}}, 0x0, 0x10a3afee, 0x0, "1a4c095d35fcdac94ef2aa630e29eb905e0f70159c05661535d507cd38dfd174edeedaed79478ea35b8132740c26a20a6a7905845d4c102f71f70d34e88717d37980ec4d35aaf978a4d02c535cfea903"}, 0xd8) 13:37:01 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, 0xffffffffffffffff) 13:37:01 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:01 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="73656375726974790000000000000000008000000000000000000000000000008500000041292257e206e2eeca3aeacd37a057485081098b611815ab9988e338f6c2064de6fa4745c10de3cb02339d54b5bbda216d6fde82cbb1fe93e0dd382613c03323718a57d6243c5190914764235bf1c61fab54087094a0f58bbba7bd2fdae9cbc55cffee08aae392880ce1af8486db85cb52238bfb8340d8ab4e533cee39b6997b17957fde3b33b5c120062b7f"], &(0x7f0000000000)=0xa9) writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:01 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:01 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, 0xffffffffffffffff) 13:37:02 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298e52bafefcf8c78ffe30423e216b9db006acf554de60dcb81945ae78f64ab9b296220375bad959c50973c01d4ea6a8d5c1e0a8f8f5b0059a605c2f1ec1935c226c41a0d", 0x87, 0x0) 13:37:02 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:02 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, 0x0, 0x0, 0x0) 13:37:02 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:02 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, 0x0, 0x0, 0x0) 13:37:02 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:02 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:02 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:02 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, 0x0, 0x0, 0x0) 13:37:02 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:02 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:02 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080), 0x0, 0x0) 13:37:02 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:02 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:02 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080), 0x0, 0x0) 13:37:02 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:02 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:02 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080), 0x0, 0x0) 13:37:02 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:02 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:02 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:03 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:03 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:03 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:03 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:03 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:03 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:03 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bd", 0x1, 0x0) 13:37:03 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:03 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bd", 0x1, 0x0) 13:37:03 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bd", 0x1, 0x0) 13:37:03 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) dup2(r1, r0) 13:37:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:03 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:03 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc9", 0x23, 0x0) 13:37:03 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) dup2(r1, r0) 13:37:03 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:03 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:03 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) dup2(r1, r0) 13:37:03 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc9", 0x23, 0x0) 13:37:03 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) dup2(r1, r0) 13:37:04 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc9", 0x23, 0x0) 13:37:04 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353", 0x34, 0x0) 13:37:04 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) dup2(r1, r0) 13:37:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:04 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:04 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:04 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) dup2(r1, r0) 13:37:04 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353", 0x34, 0x0) 13:37:04 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:04 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353", 0x34, 0x0) 13:37:04 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") dup2(r1, r0) 13:37:04 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad2492", 0x3c, 0x0) 13:37:04 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") dup2(r1, r0) 13:37:04 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad2492", 0x3c, 0x0) 13:37:04 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") dup2(r1, r0) 13:37:04 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:04 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:05 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:05 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad2492", 0x3c, 0x0) 13:37:05 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") dup2(r1, r0) 13:37:05 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:05 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") dup2(r1, r0) 13:37:05 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025", 0x40, 0x0) 13:37:05 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:05 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:05 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") dup2(r1, r0) 13:37:05 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:05 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025", 0x40, 0x0) 13:37:05 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") dup2(r1, r0) 13:37:05 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025", 0x40, 0x0) 13:37:05 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") dup2(r1, r0) 13:37:05 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:05 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") dup2(r1, r0) 13:37:05 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a", 0x42, 0x0) 13:37:05 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:05 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:05 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:05 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a", 0x42, 0x0) 13:37:06 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) 13:37:06 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:06 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a", 0x42, 0x0) 13:37:06 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) 13:37:06 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a72", 0x43, 0x0) 13:37:06 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(0xffffffffffffffff, r0) 13:37:06 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a72", 0x43, 0x0) 13:37:06 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, 0xffffffffffffffff) 13:37:06 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:06 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a72", 0x43, 0x0) 13:37:06 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:06 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:06 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, 0xffffffffffffffff) 13:37:06 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:06 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:06 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, 0xffffffffffffffff) 13:37:07 executing program 5: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/member\x00', 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) splice(r0, &(0x7f0000001380), r0, &(0x7f00000013c0), 0x5, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1f, 0x9, 0x5, 0x8, 0x0, 0x2, 0x80, 0xa, 0x9, 0xd34, 0xc8, 0x2, 0x8, 0x7, 0x3, 0x7, 0xff, 0x46, 0xc68, 0x4, 0x7, 0x8, 0xa00, 0x7f, 0x4, 0x3, 0x0, 0x3, 0x7, 0x9, 0x0, 0x6, 0x6, 0x7, 0x825, 0xefb1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1, 0x184, 0x7342, 0x2, 0x924, 0x9, 0x3}, 0x0, 0x4, r1, 0x1) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000001400)=0x1) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:hugetlbfs_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x20}, 0x54) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000080)=0x6) pread64(r0, &(0x7f0000001280)=""/197, 0xc5, 0x0) 13:37:07 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") writev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = dup2(r1, r1) io_submit(r2, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, r0, &(0x7f0000000080)="5971a8663208cf7b25f62a8558365029484c666776b01185f33666b3c0b8b5603caa8a8505024275e4b7b1188330f06251e26d990e9edd5a", 0x38, 0x1, 0x0, 0x2, r3}]) 13:37:07 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:07 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:07 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:07 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:07 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:07 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:07 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:08 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:08 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:08 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:08 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:08 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:37:08 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:08 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:08 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:08 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:08 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:09 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:09 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:09 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:09 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:09 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:09 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:37:09 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:09 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:09 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:37:10 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:37:10 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) 13:37:10 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:10 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:10 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:11 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:11 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:11 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:12 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:12 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:12 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:12 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:12 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:12 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:12 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:12 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:13 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:13 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:13 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:13 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:13 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:13 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:13 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:13 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:14 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:14 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:14 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="ff013685") r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000040)) dup2(r1, r0) 13:37:14 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:14 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb0}, 0x48) fsetxattr$security_selinux(r1, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e15f02cea", 0x0, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f0000000040)="c7ba38263b4f474a47a06b127169", 0x0, 0x800}, 0x28) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0xd6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r2, r0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000000)="d3d7be95148f040ca6183125343e34280e6cfff04917f3c320443d2a42251e64c3ddad03987b11895fababafbf9df4c8799935f9e7add175f9fe627adaa7eba42ecd39335b62b28c49295a1c312b875163d1a17b6b0cd757391a38d4ce06de3406fb71ac647add9b794cea9a0e426d60278c5241e5efbd7830c0d724fb5835675e7db2e0a6ad7ff17c4910f1d24df3fbb852b8026e2b0c56c93d417724b75b73bea644b0d13d93882bca4c1b6d4fa84c52805b9ef92a25f817dd04c0073472cd4eea136da811269ae1100991a4885a22e2960000b1179eba3a84acf5444797189f2737c70309144789ad0f4f7026f5fb126c0f03f56be480e4ce10dcd432e92b") 13:37:14 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) 13:37:14 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:14 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:14 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:14 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup3(r0, r0, 0x80000) dup2(r1, r1) 13:37:14 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:14 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x100000890e, &(0x7f0000000100)="e7f53c75bdb6d2bc43319ebac208000000") dup2(r1, r0) 13:37:14 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:15 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:15 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa198) dup2(r1, r0) 13:37:15 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:15 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:15 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2b631f9b000000000000201f006f202b72646d6120b19e76056f724701253002dea60f190a18609443043918fb745c1b19e0c9e5a95b87d958161cf110cd9235526ce47da58b0a6e7e1207912a8b73ac67b640cbaf1d6e39e6cc180d396ba142fd6bdc381303a5572bc262a1592e4fc2fad1085e80fb1b19fdaa6c97943bfe60a88699796d824cffb3cc61eda6efc39273a5c034a373b68735fc060d2cb8d242430700ff349bdcaaa558b289ebdcc6aae7ef529fd74d167ad1dc0760220b9ecb8791c19eb0e316ef5f62c83c6c8906946ce5"], 0x1d) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000140)={0x18, 0xd, 0x1, {{0xc06cd50e71e87fb4, 0x2, 0x2}, 0x1}}, 0x18) 13:37:15 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000100)={0x65d8, 0x3, 0x1}) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:15 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:15 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = dup(r0) r2 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x4b) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000240)={0x74, 0x0, &(0x7f00000001c0)=[@decrefs={0x40046307, 0x1}, @enter_looper, @free_buffer={0x40086303, r2}, @transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000140)={@fd={0x66642a85, 0x0, r0}, @ptr={0x70742a85, 0x1, &(0x7f0000000740)=""/4096, 0x1000, 0x2, 0x2a}, @ptr={0x70742a85, 0x1, &(0x7f0000000080)=""/144, 0x90, 0x0, 0x33}}, &(0x7f0000000000)={0x0, 0x18, 0x40}}, 0x40}, @exit_looper, @free_buffer={0x40086303, r3}], 0x1000, 0x0, &(0x7f0000001740)="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"}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r4, r0) 13:37:15 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:15 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x101000, 0x20) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r2, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:15 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000000), &(0x7f0000000080)=0x10) dup2(r1, r0) 13:37:15 executing program 5: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:15 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000000)) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) open(&(0x7f0000000100)='.\x00', 0x105000, 0x100) 13:37:15 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20200, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000740)={'security\x00', 0x1000, "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"}, &(0x7f0000000080)=0x1024) 13:37:15 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:15 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000000)=0x80000000) 13:37:15 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x3, &(0x7f0000000100)="6de0be8c6472a2043f26c11179d30853ff3d2d1702d8e4a362183cae8d3105898f31944b6cbf4b4f0bbac8d46a52ffafff4da0a46acae18b3884e59876efeed6e201bf991638b2753c85d09271e53560bd2dd63296903e660189a239cba6b2d3f882a1f9ab94e03d2748d2eb0fede430d708b0d1a7e2b8dc0b90945bd27ea2eeb49f4256386a50fe6d057584d98d312f7790fb3ac49faa5b3e66d77f1fe2b73e2869386367f92d9bbd3f055c050726a19fc8cd3783081107b06e2860b72680a858bf9a2d9d0564eca86d74e8834347226dcc") ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0xfffffffffffffd1e, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x7, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) write$input_event(r2, &(0x7f0000000000)={{0x77359400}, 0x1, 0x6, 0x7f}, 0x18) 13:37:16 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:16 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0x5ddf, 0x1f, 0xffffffff7fffffff}, 0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r2, r0) 13:37:16 executing program 0: r0 = fcntl$getown(0xffffffffffffffff, 0x9) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:16 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:16 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:16 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000000180)="db96ba9f3bab959ac2d5099b3f165bf2483c91ec291692d6fbf52036b6565c6ef4434a7daf8f5f20f576bd28d657aacd2714e9500f776f6e0677568e9137480484679d8e5e32cba2961705179051551cd4e64d9cb395a0ef586f2597eb1b4e91e5b14cb35f5868d8e976e396a06c01eaa3d64bc1e6396fa42b44ed260fa6a5974945", 0x82) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000000100)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:16 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa198) dup2(r1, r0) 13:37:16 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/unix\x00') write$P9_RWSTAT(r1, &(0x7f00000001c0)={0x7, 0x7f, 0x2}, 0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x10001, 0xfffffffffffffffb}, {0x1, 0x2}]}, 0x14, 0x1) r3 = dup2(r0, r2) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/access\x00', 0x2, 0x0) fremovexattr(r3, &(0x7f0000000000)=@known='user.syz\x00') setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000200)=@req={0x80, 0x100, 0x7fffffff, 0x4}, 0x10) prctl$PR_CAPBSET_DROP(0x18, 0x6) write$P9_RSYMLINK(r3, &(0x7f0000000140)={0x14, 0x11, 0x2, {0x6, 0x3, 0x4}}, 0x14) 13:37:16 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@empty, @multicast2, 0x1, 0x8, [@broadcast, @empty, @multicast1, @loopback, @empty, @broadcast, @empty, @multicast2]}, 0x30) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x200) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:16 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f00000000c0)="acd5f19e7038baa2d9e9009269c41049f9db3a6396e9932b3e281771c83fc4b72f0822abe53665f8adcb80b3bc9f6c9455c50d1aac9bda274ea0007be99ba570a8b1db654f51df674574c00da306b26075a3e73293e3bd0b50d59b26d34569946864259f1dfc670840e5fc501991fca5477e845fd7cb5069f71c01006be1d1b4bb76acb3ad305110a0", 0x89) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) dup2(r1, r0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0x10, "d6fc47"}, 0x5, 0x1) 13:37:16 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:16 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) mlockall(0x17) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) futex(&(0x7f0000000180), 0x1, 0x2, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)=0x2, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0xa0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000100)) 13:37:16 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, &(0x7f0000000200)) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:16 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:16 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:16 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x105840, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000100)) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:16 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:16 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) syz_emit_ethernet(0x25, &(0x7f00000000c0)={@empty, @dev={[], 0x10}, [], {@mpls_mc={0x8848, {[{0x2, 0x0, 0xfff}, {0x3f, 0x0, 0x1}, {0x3, 0x0, 0xffffffff80000000}, {0x1000, 0x0, 0x80000001}, {0x1, 0x0, 0x5}], @llc={@llc={0xf4, 0x8e, "e7"}}}}}}, &(0x7f0000000080)={0x0, 0x3, [0xd5, 0xa77, 0x2bf, 0x949]}) dup2(r1, r0) 13:37:17 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1, &(0x7f0000000100)="11dca50d5ed0295419fabefdb2b486ed4cd602273f") pwrite64(r0, &(0x7f0000000140)="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", 0xffffffffffffff4c, 0x0) 13:37:17 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa198) dup2(r1, r0) 13:37:17 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000200)=r2) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f00000001c0)=0x4) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/111, &(0x7f0000000100)=0x6f) r4 = dup2(r1, r3) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000140)={0x5, 0xc15}) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000240)=r4) 13:37:17 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) timer_create(0x3, &(0x7f00000001c0)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000280)={{r3, r4+10000000}, {0x77359400}}, &(0x7f00000002c0)) 13:37:17 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/204, 0xcc, 0x10000, &(0x7f00000002c0)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = dup2(r2, r0) statx(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000080)) 13:37:17 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:17 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e22, @empty}}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:17 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, &(0x7f0000000200)) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:17 executing program 5: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x666d) sendfile(r3, r4, 0x0, 0xa198) dup2(r1, r0) 13:37:17 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:17 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000100)='security\x02\x00') ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:17 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:17 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffff7f0000000063140000000000000600000000000000", @ANYRES32=r0, @ANYBLOB="000000000600"/28, @ANYRES32=r0, @ANYBLOB="00000000923500"/28, @ANYRES32=r0, @ANYBLOB="000000008100"/28, @ANYRES32=r0, @ANYBLOB='\x00'/28, @ANYRES32=r0, @ANYBLOB="0000000001000000ffffffff00"/28, @ANYRES32=r0, @ANYBLOB='\x00'/14]) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:17 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xdaa893fa8e5be2fc) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r3, r2) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x8, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8a}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 13:37:18 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_TSC(0x1a, 0x0) recvmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000380)=@ax25={{0x3, @rose}, [@null, @netrom, @remote, @rose, @default, @bcast, @default, @rose]}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000500)=""/143, 0x8f}], 0x2, &(0x7f0000000600)=""/254, 0xfe}, 0x5}, {{&(0x7f0000000700)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000780)=""/178, 0xb2}, {&(0x7f0000000840)=""/36, 0x24}, {&(0x7f0000000880)=""/11, 0xb}, {&(0x7f00000008c0)=""/237, 0xed}], 0x4, &(0x7f0000000a00)=""/117, 0x75}, 0x49}], 0x2, 0x1, &(0x7f0000000b00)={0x0, 0x1c9c380}) sendmmsg$inet(r1, &(0x7f0000000c40)=[{{&(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="517a9b3c13a5ba06fb658a", 0xb}], 0x1}}, {{&(0x7f0000000180)={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000340)=[{&(0x7f00000001c0)="89eca242b91cad3138aafdaf6a280e36330434ca1cac4f27eecc1851047e3c21f101c6d4a341bc0317ac4991a38003261da95ad9d3f07f832c33cc65bf642463a7203f201bb36b2af4754ba73d884c0bf51546ada1ab320dcef5edc2cb576c39c5f50c127b4f602196eafc37b77c965683d90905ec9762aedd959be08a541a1d72d88b71b7ed2c89c2266941903ea4fb372733f0dcb15d49ad4a9757af7021cd", 0xa0}, {&(0x7f0000000280)="23b40198e7c26a7e9d37cfa360f98e9e074b567be6eb58a28a122163976cc43aaa4f68183aab18b3dbcb058234183a8efdb180e3227d8eeeffaedcde3af497fff8159c3a6c6590da1f23caca2df08606787354e87d6631d33368f949fa600989810e56c08ea65ae6126ef105634e30b1c2", 0x71}], 0x2, &(0x7f0000000b40)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_retopts={{0x40, 0x0, 0x7, {[@cipso={0x86, 0x14, 0x1, [{0x1, 0x4, "96f5"}, {0x5, 0x4, "ad56"}, {0x6, 0x6, "86c089a6"}]}, @end, @ssrr={0x89, 0xb, 0x7, [@loopback, @local]}, @lsrr={0x83, 0xf, 0x6, [@loopback, @local, @dev={0xac, 0x14, 0x14, 0x10}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5296fd2c}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0xffffffffd3a9aa18}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0xd8}}], 0x2, 0x1) ioctl(r1, 0x1000008914, &(0x7f0000000000)="0700a70dab71acf10416e4b64c5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:18 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:18 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e22, @rand_addr=0x1}, {0x8491e7852b4b67f2}, 0x2, {0x2, 0x4e20, @multicast1}, 'veth0_to_bridge\x00'}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0xa100, 0x0) dup2(r1, r0) bind$netlink(r2, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbff, 0x200000}, 0xc) 13:37:18 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa198) 13:37:18 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = gettid() open(&(0x7f00000000c0)='./file0\x00', 0xc0, 0xc3) setxattr$security_capability(&(0x7f0000000600)='./file0\x00', &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f0000000000)) dup2(r1, r0) [ 1500.998575] Invalid argument reading file caps for ./file0 [ 1501.029711] Invalid argument reading file caps for ./file0 13:37:18 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, &(0x7f0000000200)) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:18 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2000, 0x0) 13:37:18 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:18 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:18 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r3, 0x0, 0x666d) 13:37:18 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf08b") dup2(r1, r0) 13:37:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4001, 0x1) write$selinux_attr(r0, &(0x7f0000000180)='system_us0\x00'/26, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x5) write$P9_RAUTH(r1, &(0x7f0000000100)={0x14, 0x67, 0x2, {0x1, 0x0, 0x7}}, 0x14) sendfile(r0, r0, &(0x7f00000002c0), 0x5) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x9ab, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r2, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) write$P9_RREADDIR(r0, &(0x7f00000001c0)={0xe4, 0x29, 0x2, {0x1, [{{0x10, 0x2, 0x4}, 0x0, 0xffff, 0x7, './file0'}, {{0x14, 0x0, 0x2}, 0x9e8, 0x9, 0x7, './file0'}, {{0xcc, 0x4}, 0x7fffffff, 0x62535b99, 0x7, './file0'}, {{0x10, 0x4, 0x8}, 0x100000000, 0x40000000000, 0x7, './file0'}, {{0x40, 0x3, 0x5}, 0xbc, 0x8, 0x7, './file0'}, {{0x21, 0x1, 0x8}, 0x0, 0x0, 0x7, './file0'}, {{0xa, 0x4, 0x5}, 0x100, 0x80, 0x7, './file0'}]}}, 0xe4) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x34, r4, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) 13:37:19 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) fchmod(r0, 0x22) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 13:37:19 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:19 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:19 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup3(r0, r1, 0x80000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xfaf55c7a4739e305}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x94, r3, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40e}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffffff}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x654472276e2e1e21}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6bc}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xdfc8}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x80) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000007, 0x50, r0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file0', [{0x20, 'veth0_to_hsr\x00'}, {0x20, '/selinux/relabel\x00'}, {}], 0xa, "b80ce4acc8edeb68821dd5420a0158f0a8b8c04b99abb787c00267faa2250ad34e22ef4928b15135cbd99bcfbcbe914c8d3485ab8696f49613f510f33e485bebdb1c4e601f88fb"}, 0x73) 13:37:19 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r0, r0) ioctl$TCSBRK(r2, 0x5409, 0x1fc) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xf) 13:37:19 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r1, 0x0, 0x2, 0xa800, 0x100}) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r3, r2) 13:37:19 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000100)="00034c4b7f228af4c3184127bb1ecca6c031fc37d46e3721b89aee74028d764a7d23e01e518cc95b417268596d7aa930c91f4a2ea3b3b9b0a7d1dc3e416c75fd7fc848290e4e04436d6c14b05ea2278834ce0596fc8c1900ce2edd92972ffd7cf9064cb1615df65f0d8e420a877ee111ca1f21f356e7bf41e1acd0c08f5a8384e572c4e3e44ec18e491954a0cb4262a21e08d309bd852da3dff1e7e8b8ef7f7fc88345efc4505a7e1d833d2401724e94dd4156ea6c07b14ef2271dea05d6c4d997d295") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:19 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:19 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r3, 0x0, 0x666d) 13:37:19 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000003c0)={@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x16, r3}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:19 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xe709f45da97b69d5}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x114, 0x6, 0x9, 0x100, 0x70bd2b, 0x25dfdbff, {0x5, 0x0, 0x5}, [@generic="4e386eb3861591a502fee28c3e611d091da6affa2d62b33b9f7afff6d6f0b84a989627b76d46b35d7d388183ef77c83e90d41dfef873831b758135f8b5b050ca4b6865ce8941137deb4ac21e350740f7cc53715802440eb33f34912ccb514a7501131218c9b2d10b93fac009e227cecf3cd765b5c2f325197d6341a2c6e8d32d71d76e792ac9d95ad8497d4fa58f793a906092443abac181f5a294cf74dd532cd17511f4848517ddd3de8785fb5a5edb430155afae99d2c6e9a03513afbea4d746ca490b94e239491ee5", @generic="a40d0fa1ced31342472cbe77af819e636efe07c372307f0df89b932da55f2515716586109ead93ccae10c44216bf1646eeab76945fe7"]}, 0x114}, 0x1, 0x0, 0x0, 0x80}, 0x8000) dup2(r1, r0) 13:37:19 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup(r0) ioctl$TIOCSIG(r2, 0x40045436, 0x17) dup2(r1, r0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e22, 0x853, @remote, 0xf9e}}, 0x0, 0x8000, 0x0, "eb7727d419111d778a8aeb43b0182ecc52408459fc4d1420ac1e650d93a08d8dcb03af1ec2750ec03b16c675545c403e748b2d63f3a0a5258fd8741ef2b785aa86e8611f449d48c9373913c136b8fe62"}, 0xd8) 13:37:19 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:19 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x8000, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x3}, 0x8) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) getsockopt$inet_int(r1, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000140)=0x4) 13:37:19 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:19 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r3, 0x0, 0x666d) 13:37:20 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:20 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:20 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:20 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 13:37:20 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa198) 13:37:20 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:20 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socketpair(0x10, 0x5, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r1, &(0x7f0000000100)="831f9c79bfeae8dee3cb829ec9e68572311718b8521a80479b0980447ac80b4bda3dc68bbdaf", 0x26, 0x800, &(0x7f0000000140)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'bon\x01\x04\x00', 0x1}, 0x18) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = dup2(r2, r0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000000)={0x1, 0x0, 0xffffffff00000000, 0x3}) 13:37:20 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800102}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="6c00cfd5", @ANYRES16=r2, @ANYBLOB="cd432dbd7000ffdbdf250300000008000600ff00000018000400cc0d000009000000480c0000e7000000290000000800050002000000080006000400000008000500040000000800050003000000080005000200000008000500010000000800050001000000"], 0x6c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000640)={'rose0\x00', 0x0}) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000280)={'ip_vti0\x00', {0x2, 0xffffffff, @remote}}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000680)={@mcast2, @mcast2, @dev={0xfe, 0x80, [], 0x22}, 0x6, 0x8, 0x2, 0x100, 0x9, 0x1, r3}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE(r4, &(0x7f0000000400)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000300)=""/219, 0xdb, 0x6, 0xd, 0x1ff, 0x8, 0x9}, 0x120) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:20 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) socket$inet_udplite(0x2, 0x2, 0x88) 13:37:20 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:20 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$peek(0x3, r0, &(0x7f0000000080)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r1) 13:37:20 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:20 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:20 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:20 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000100)=0x81, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x22000, 0x80) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000080)) dup2(r1, r0) 13:37:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10b880, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000140)={0x2c, 0x31, 0x10, 0x13, 0x1, 0x100000000, 0x3, 0x2e}) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) write$P9_RREMOVE(r3, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) pwrite64(r0, &(0x7f0000000200)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x840, 0x49b98a51ea4bd14c) 13:37:20 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa198) 13:37:21 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa198) 13:37:21 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:21 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffffa, 0xa9, 0x4, 0x1, 0x7fffffff, 0x2, 0x3, 0x0, 0x3ad, 0x40, 0x84, 0x9, 0x10001, 0x38, 0x1, 0x7f, 0x2, 0x3}, [{0x60000000, 0x4, 0x7ff, 0x3, 0x1000, 0x55f, 0xc2, 0x80000000}], "2fb025efd533af3f56ce4bb875f4a11cf58d5471eec131d89cf93f902e80d6fa899d6b24943709386d49bef6f8ca11497c7d6679801cca1e4124cce59f88128c7ea7c1cda499b353b2b16838b35a521c8c511c74d69d2b51fcb4bac129b5414b1a6bd5e2254d1df7c59cb72a", [[], [], [], [], [], [], [], []]}, 0x8e4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x4e) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000080)={0xab6, 0x1}) ioctl(r1, 0x8, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/4\x00') ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x10001) r4 = dup2(r1, r0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)=0x0) fcntl$lock(r4, 0x26, &(0x7f0000000140)={0x2, 0x3, 0xd4e, 0x8c, r5}) 13:37:21 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 13:37:21 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x666d) sendfile(r2, r3, 0x0, 0xa198) 13:37:21 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) write$P9_RSYMLINK(r1, &(0x7f0000000100)={0x14, 0x11, 0x1, {0x0, 0x2}}, 0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:21 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") readv(r1, &(0x7f0000000640)=[{&(0x7f0000000080)=""/72, 0x48}, {&(0x7f0000000100)=""/184, 0xb8}, {&(0x7f00000001c0)=""/178, 0xb2}, {&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f0000000000)=""/8, 0x8}, {&(0x7f0000000380)=""/133, 0x85}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f00000004c0)=""/66, 0x42}, {&(0x7f0000000540)=""/93, 0x5d}, {&(0x7f00000005c0)=""/120, 0x78}], 0xa) r2 = dup2(r1, r0) getsockname$unix(r2, &(0x7f0000000740), &(0x7f00000007c0)=0x6e) 13:37:21 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa198) 13:37:21 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:21 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) pwrite64(r0, &(0x7f0000000100)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58357fc8905e122ad249211d21025697a7298a6a82787e49f2b8b5b603689a7b23bbf0fea5dbc6cb50e144d0f9f26e0a75a4fc3af60e1b09b071d", 0x1c1, 0x0) 13:37:21 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:21 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:21 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa198) 13:37:21 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000180)="bdb6252ac0db2afefc9cc1cdc517a13c275e49d44486fb9debd5cfc059f69f7b658e8035c841157902a58353fc990000000000000639bdc07e0d43de4ad9744e75f2abe50a2a349e71c01c315a42f0000000000000000000000000446f7a60aa3a3d1222a9b0247b0000", 0x6a, 0x0) 13:37:21 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r2, 0xffffffffffffffff, 0x0, 0xa198) 13:37:21 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:22 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:22 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000100)="19f3252ac0db2afefcfc64b9c1f401639f569cc16cc517a13c275e499f7b658e7902a58353fc9211d21025697a7298dbc3d58a103ab86f306fbb1ea32d8eee127b798e43a76589236add1a80743ee7fbcc2d8b40846ab0ad79343d0738e51c497ea56a62d66103832b49339c1867f4fae421350ee2910b6b1a2e74acddd9af764058dc9f7b038d219c7f205e320f48d0a7224c4bfaac231f2e6633c49afef08acc36de4ee082d3158ca545cb0b7e0faf468e7d32b6ca11ca9b1a9588641095eb1d24b9a4b3b9aaf1580bfe62e2235ab61eb0c500d93100"/229, 0xffffffffffffff75, 0x0) 13:37:22 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:22 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:22 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:22 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:22 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ftruncate(r1, 0x0) dup2(r1, r0) 13:37:22 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x4e22, @remote}}) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:22 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:22 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:22 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:22 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000080)=""/234, &(0x7f0000000180)=0xea) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0xb) dup2(r1, r0) 13:37:22 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000140)={0xc023}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000000)) 13:37:22 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:22 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000b400000039414ff255208e1495a4d47b109de4fe436b8c2cbdbf541277f4473a0c6098ab9588e5d782b9c02071c206fe6d3e98dc26a890f138cf2c10fe63c1ef3393d8a87027d06c05a446c39244ebead9ef56d7a1bf1536c1ca0d613f3954e8723c36141fe12b456f35ba22e3011008e5704dbf013b38dbf715bb6a0f2e4f55502567d7d8da66cda7135c9e8e1e71c216cde2c0c3f3c69c3321c4ca3ef17b492e741cea80a4fe4076f6ed64074972d30000000000000000f5b360600005bf009932e3"], &(0x7f0000000180)=0xd8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r2, r0) 13:37:22 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685, &(0x7f0000000180)={0x1, 0x9, 0x1000, 0xdb, &(0x7f0000000080)="df6fb79ce37adffa3d9e6dafac49208e10248bd8ccdb101f6152d494e9e5f73aab24371500a7fcbe5e652dff84ec80f66e50efda865e46b7f2d7b9eb841b18ce3914cd50d92206dded978ee07e0a466bdb6f9943b57b07e0d57cda54b1bda8d4808cd2960ae21ee4ae20d00b80321d192447d3706ca53ff973e85286ab5f59c8ccf29c041c1d69dd1141c1b8ce22e92e12ba337bc9889cdd3d020205eeeae242f1db5eb2f990c95f7785954c09abcc8a802c10ac7a590ba4dce9a7b00b450d08578c4806c0ab847fee6e23a5018930368880090232a3921683bc0f", 0x27, 0x0, &(0x7f0000000000)="ac256591fa32c048a4b1d58de86227d7c10a3bdda61e7f7d137d17c80adca2f080b7cd17855f19"}) 13:37:23 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:23 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:23 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, 0x0, 0x0, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:23 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:23 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:23 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:23 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000000)) 13:37:23 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:23 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x16de85b62b373956, 0x0) statx(r0, &(0x7f0000000100)='./file0\x00', 0x4000, 0xc0210340e8ee193d, &(0x7f0000000240)) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x3f, &(0x7f0000000140)={@dev={[], 0x23}, @dev={[], 0x3}, [], {@arp={0x806, @generic={0x130a1e2fb27c3301, 0x8863, 0x6, 0xd, 0x8, @dev={[], 0xa}, "bfc9c8e47544b9e5b62f6b99f2", @dev={[], 0x21}, "b07b8fab413494e0a36f1a4bc925434d"}}}}, &(0x7f0000000340)={0x1, 0x4, [0x783, 0x78e, 0x7ec, 0x242]}) pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x501000, 0xbabc94a2d686d5dd) setsockopt$inet_udp_int(r3, 0x11, 0x0, &(0x7f0000000380)=0x8, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f00000001c0)={'ipvs\x00'}, &(0x7f0000000200)=0x1e) 13:37:23 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = fcntl$dupfd(r1, 0x0, r0) openat$cgroup_subtree(r2, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f0000000000)={0xc023, 0x2}) dup2(r1, r0) 13:37:23 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:23 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="29080000000000000a004e230000002000800000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000010000000a004e2100000006fe8000000000000000000000000000aa0700"/272], 0x110) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0xd, 0x4, 0x9}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xffffffffffffff80}}, 0x10) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:23 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:23 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sync() ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "ef7c405c369826d98014c05efa5f8888"}, 0x11, 0x1) 13:37:23 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r3, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x70}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe10}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000800}, 0x8000) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:24 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:24 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1a0, r3, 0x18, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x64}]}, @TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6c7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1f, @empty, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'vlan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x797}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x93}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x21c3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x40088c1}, 0x4000000) socketpair(0x19, 0x5, 0x5, &(0x7f0000000440)) pwrite64(r0, &(0x7f0000000480)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x309, 0x0) timer_create(0x3b2d74fa9580c5cb, &(0x7f00000003c0)={0x0, 0x30, 0x5, @tid=0xffffffffffffffff}, &(0x7f0000000400)=0x0) timer_delete(r4) 13:37:24 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:24 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) keyctl$session_to_parent(0x12) 13:37:24 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, r0) 13:37:24 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/packet\x00') setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000100)=0x1, 0x4) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:24 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:24 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:24 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0xdb3b77eb69a5e3c7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r2, r1) 13:37:24 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0xffff) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:24 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:24 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000280)=0xffffffffffffff46) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x87, @broadcast, 0x4e20, 0x3, 'lblc\x00', 0xb2bc062f5665ccbf, 0x800, 0x25}, 0x2c) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@hci={0x1f, 0x0}, &(0x7f00000001c0)=0x80) getresuid(&(0x7f0000000480), &(0x7f0000000240), &(0x7f0000000440)=0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000600)=ANY=[@ANYBLOB="040000000000000000000000000000000000000000000000b595c5872210fb830bf4d9ae1f246391d88c3275937baebf4ddc57d4094be63087dd9c5c1bbde2fdfe6a7aa913abf8f9880e9c50ae4826d9c1c112fe4ff441dc5479bb765b93e11f3a85b8f18c78a29d5dec163a3e1405c073120480ac9ad57ddc41ff87158d52f4a8cd5a16cf0023019823b5f6907c0038f60d9b"]) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@loopback, 0x4e23, 0x1, 0x80004e24, 0x101, 0xa, 0xa0, 0x20, 0x62, r2, r3}, {0x3, 0x5, 0x80, 0x10, 0x3ff, 0xfffffffffffffff8, 0x0, 0x3ff}, {0x400, 0x3, 0x1, 0x7fff}, 0x7ff, 0x6e6bbf, 0x1, 0x0, 0x1}, {{@in=@remote, 0x4d4, 0x6c}, 0xa, @in6=@loopback, 0x3504, 0x0, 0x3, 0x3, 0xffff, 0xa00000000000, 0x3}}, 0xe8) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000004c0)="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") pwrite64(r0, &(0x7f00000007c0)="bdb6252bc8db049f569cc16cc517a13c27d649b4442e42ebea0000000086fb7cebc996b2edd5cfc049d49f7b658e7942a58353fc8905e322ad249211d21025697a7298e86c1e81e952c80d89affe1dbd5abb7d4eb8e55c3a941d9d755e8bb4e8353ff5916b8de3eb3c3c62d20a750b3d4879d2a5928e85315be83451e2eabf1272b0f8c4cf4736d04427db080e62", 0xfffffffffffffd63, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x1, 0x0) fcntl$notify(r4, 0x402, 0x2c) 13:37:24 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0709c377ce75eb0eba07beb9cf51efc5f2f2d5ff048a77328770ae2bb374bfa44eabf0100000001000000f1f4c596e2e08875fc42c82e157d7974249a9dcfedd56dd4") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='S\xd1N\x9d\xca\xdb\xd6\b\x88\xbe>;o\x8c\f(\xa5\x9b\x93\xe1\x98\xcfg\x8dO\x03\xd5Rh.yy\xaa\"\x8c\x9f\xac*Px\xef\x1f\\reOU[:\x86l\x91\xe6f\x0e\x9f\x85^\xfdj\xe3\x8f\xbd\x82F\xb7k\xe1C\xac\x05\xe8\xcf\x16\xcf\x9b\t\xcdf\xf0\xb6J\xdb8\x13\xcd\x04\xed\x14\xa2\xec\xb3\'G\xda||\x80F\n\x069\x9d \xd5\xfd\xad\x9c\x831\x9b+\xe0\x9d\xbf\x16\x9f\x14\xc1\xd9\\\xcd\x8bs\x15S}1\xba\xbcW,.Z\x9d|!\xc4\b\x05S\x9b\x81\xeb\xe1\xf9m\x8d\xf9\xda\xe2\x9c\xcau\xeb6sV\xa8\xb9\xb8\xb5D\xb9\xbb\xf5\x84\x00\x00\x00\x00\x00\x00\x00\x00') getsockname$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x10) r3 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000040)={0x0, 0x6, 0x80000000}) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000180)) syz_open_pts(r2, 0xd3489d4e8f68ddd) 13:37:24 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100)) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x50, r0, 0x0) 13:37:24 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:24 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:25 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008914, &(0x7f0000000000)="11335edca5ff5e0bcfe47b") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:25 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x6, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070457e5a54a5b52c1f8dee91adc7f0789f0dce4f8d29644b9d783ca1484cd71f4dbb62aef6c984b1914e4c1db109e46f1e40c1fea58ccede935dd50843e7c9578ccbded2fb7bee4bd9ffd3169ddbb2b98fc121fc1513616b222b4d76d1313340a3516d5e7cb375cc829cf40810a0cdc57e779e8115788dd37fdc85f1c422518b0e8cc7937d3edfb7e563d0ddb3a6e1601db5fd71bb61f5e6198dd724fd6a0797b1f0002ca4b98c74272e1dc2a3ea27c5f3a7ed1f2e") socket$inet(0x2, 0xf, 0x6) r2 = dup2(r1, r1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000380)=0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40002100}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="00010000", @ANYRES16=r3, @ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x8000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000340)=0x7fff, 0x4) gettid() 13:37:25 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:25 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000100)=0x8) 13:37:25 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000005880)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x0) keyctl$read(0xb, r1, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r3, r0) 13:37:25 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:25 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 13:37:25 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:25 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(r1, 0x99baf5448e1f6b7) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000000)={0x9, 0x2, 0x9, 0x6}) 13:37:25 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', r2}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:25 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) ioctl(r0, 0x4, &(0x7f00000000c0)="5d529ffc9301302b30600e317aa6ff91ff22c3b5a5654064e0a9a0bfb4095a89c91c0578b3a3599f30665048214a5acf732ca0c021fd34ca3151108cfafe13d08045070865ec49222f283b228b291ac631cd8b88f84587f01beb54e81bafb7960772e5b47f426d937086a1c6894145d0fec77e9c199b0e0cc681917a4986de337df28179eec38d5bc835a52b71ba7727806578dd887b7d972b79cfd0279a333685d08b460bab4935839c0ac3cbe8dac417a656a445efb5228f37dd9719ab7dc045efe6f5bff4acd289fdb1bb91068cd17fd2b6d2203daed2bcdd") getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) 13:37:25 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x2bfb, 0xfffffffffffffffb}) 13:37:25 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, r0) 13:37:25 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000340)=0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x40, 0xe6, 0x3a7b, 0x8, 0x0, 0x3, 0x0, 0xa, 0x3ff, 0x8, 0x7f, 0x1ff, 0xc8, 0xf9, 0x1, 0xa8f8, 0x7, 0x40, 0x6, 0x4, 0x5, 0x401, 0xd20e, 0xaea0, 0xfffffffffffffffa, 0x3, 0x7, 0x9, 0x4, 0x9, 0xfffffffffffffff2, 0x0, 0x100000001, 0x1fe00000, 0x80000001, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000280), 0x2}, 0x0, 0xa3b, 0x5, 0x5, 0x6, 0x2, 0x5}, r2, 0x1, r3, 0x2) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f00000003c0)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10, {0x2, 0x4e23, @multicast1}, 'veth0\x00'}) write$UHID_CREATE(r1, &(0x7f0000000100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000000)=""/38, 0x26, 0x100000000, 0x5, 0x6, 0x5c37f109, 0x5}, 0x120) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x400040, 0x0) ioctl$KDADDIO(r4, 0x4b34, 0x6) 13:37:26 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:26 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 13:37:26 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") lseek(r1, 0x0, 0x2) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x424080, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x7a7e0bd6f3ea1bf4, &(0x7f0000000080)=ANY=[@ANYBLOB="2f00004000000000c204000000020000"], 0x10) dup2(r1, r0) 13:37:26 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:26 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000001c0)={0x4, 0x55, &(0x7f0000000140)="ca5e4e5145563b92c8b15977a5870631b8ab77259c52b008a376d1c8852ab318ad498fa43699249aadbdfec871bb318ae7cfb6e70469cd381c0fe2953aa9bbb893a0a163935d0f7f74f3c4cc31898c220e15ace255"}) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000100)=0x3e45) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r3) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) eventfd2(0xffff, 0x80800) 13:37:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) r2 = dup2(r0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) 13:37:26 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 13:37:26 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:26 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xa1, &(0x7f0000000080)="2e096eedf078974ffd8cb46e9e3e2b9c3ddfc70003eb961f8df46105ce4c2aed129055fcf542661f8c1340d823fece42f5af21e1e31481b7082ce336430b1397605172a8ad9a99b888724a61170eb6d2f9bb5a800b7cbced90797596fba5e24ee820d939fcdbd1ba7ff98e17f27f97c2f504c8d505ff4521109c6719fd9790ddf3a4f4425ac94b399453dbcb3df189bd53de5bc9a08f03f09a3fe7f7dc1b5fa5d6"}) dup2(r1, r0) 13:37:26 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x404080, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000100)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000180)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:26 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) pread64(r2, &(0x7f0000000100)=""/250, 0xfa, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000080)={{0x3a, @multicast2, 0x4e24, 0x0, 'sh\x00', 0x20, 0x5, 0x8}, {@local, 0x4e24, 0x0, 0x400, 0x1, 0x6}}, 0x44) 13:37:26 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xa080, 0x0) accept4$unix(r2, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x68d260780b2ef342) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:26 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:26 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/access\x00', 0x2, 0x0) ioctl(r1, 0x1000008916, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:26 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:26 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:26 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:27 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:27 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000100)={{0x5e, @multicast2, 0x4e20, 0x1, 'lc\x00', 0x12, 0xffffffff, 0x41}, {@local, 0x4e21, 0x2000, 0x2, 0x5, 0x8}}, 0x44) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:27 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000400000000007, &(0x7f00000000c0)="83fd35068862f7d3645bebca5e568e4d81614e5af8bc338a0826bbfc112dab72f5b8d3443cdcb38729c80933b865682dbb42cf2ab5f2106be44123bab8dbe013a772f64c29c6f24ee6bce15b45c14e7aff2b231b15b2d9fa7140c69feae31805313f9ce641361251fb22d5a687d1f2862cf646") r2 = signalfd(r1, &(0x7f0000000000), 0x8) dup2(r2, r0) 13:37:27 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xd87) 13:37:27 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setregset(0x4205, r1, 0x2, &(0x7f0000000180)={&(0x7f00000000c0)="3f6c32628d3e5dd795e5b2d5248d18fc7168cbd8068d2fccb8f293f1936746883f85d10eb3f1db9d3196b16bd88c9b7f68af630a7232b012fbe9792c7d6e5fd7a572805dcd347d08abe37957b72bf0bb0d55f7f061096d738f51ec653ff4513330d04a6e3332b90e5cc2a6b58b29202b0ab8aed70c12e2b3cc4bd8a59ad26200bd9936711ff84cd9b71dd576968319d29c64c6d4a7f267", 0x97}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) dup2(r2, r0) 13:37:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 13:37:27 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:27 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0xa00, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x24, r2, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x31575294}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x44) dup3(r0, r0, 0x80000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r3, &(0x7f0000000380)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0xffffffffffffffbb, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="fcdf22c707b0ef2e0901ca7ab45f53e55da4166cfd3b336c06f63cb5eb3dca7224a15a7809b3967771090f41b22d6ec96e363310a4ad817819bf67544563e8b1a35ca412d3dd997bc9ed317ae89df91ff1ac000befcb7b093c5b4a5c51b76d2f44874b70301b08aa1b82e2a0a991c8f9e599eece6a00bed271055a7c6d59e0cb9b9a3a5da964c48406147e0d124d31a1069c3de80a642ee7acec580a7d5cdedc03032abb8cce5d6bfabe5b572eb9ea120d30bac21b8be5e395", 0xb9, 0xfffffffffffffffc) keyctl$read(0xb, r4, &(0x7f0000000200)=""/207, 0xcf) 13:37:27 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:27 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:27 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, r0) 13:37:27 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x80000, 0x0) inotify_add_watch(r2, &(0x7f00000001c0)='\x00', 0x10000000) write$P9_RMKDIR(r2, &(0x7f0000000140)={0x14, 0x49, 0x1, {0x20, 0x3, 0x2}}, 0x14) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000180)=""/23) ioctl$RTC_AIE_OFF(r2, 0x7002) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="af17753fe2ced272c708339fe07cf145c67c8a48099338dbee25fe20bd5aaf9b515347be836c1fc06f740c6b377c22cd4b6a7dea0e6f1701e18108411258f254da665ad4303ed77532967501c7034bd457f162d2e44c375444ec686ee761f9d45e8255a35a430d299f41b1993dd6df665144b4f72818297bd795c7562533eaa2d9e3314c52767d9da2e1782f42eb3c0b92b351acadc30008c2c6ebff40be996c5cca5552c1bced9d23fd6850d0c0297420c289c6d1ea0aa18f38e3fbe607fe64cafc835f", 0xc4, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000380)={r3, 0x78, 0xca}, &(0x7f00000003c0)={'enc=', 'pkcs1', ' hash=', {'wp512-generic\x00'}}, &(0x7f0000000440)="ce7e8b59e17326ead7d3196d5f809b336df445c3f7945b2196fc42db3efa17440faaf1a4fc458827827f0c4663e0e06880e91956e130351b7b77ca8c9f7be236b572f2ad3caf9e0d624291484541754cdbfa985b57c5dae18b62e72a228996473eac513bdf4afbc3729ec8f706da8dc80ac6d419c7592a0f", &(0x7f00000004c0)=""/202) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:27 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) fchmod(r2, 0x100000004) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='lo\x00') setuid(0xee01) r3 = creat(&(0x7f0000000380)='./file0\x00', 0x0) ioctl(r1, 0xd8d2, &(0x7f00000004c0)="b647b23d0ee82916cf65f14849dbde55c2bea3c918b92e03b77128e834ac74f5739e6d982dd9d973c41a3c74c8e8a7687cd198189654802656f9a5eb421d3f1bfd9a06627751d6d5cf8366353fb1e09fc138963b58374215a0dfe857a88103fc7dbd0142521fbb031d638e8dc5c34a9b60761a2bc10b89ead1b2d3445503f989ab62d42f6d5c4de9830806ab6b017992c36559c354df0e5805527e4463c2c251d60850e4c3adcce1302327b9e7cc45590ddfa84ca54779e6b8691a50c16a6e23abc4d536f0d914312c9e23975e6075485ff87d60279de5d1299c8392895b328a088e5d0db10546") getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) tkill(r4, 0x3f) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e24, 0x6, @rand_addr="65a9abef010a7bda3abf8a1247043ac7", 0xe80}}, 0x0, 0x7, 0x0, "39286f2045f282486effe0df3a1c602da9b5e9fd4b1b63c413a59d25d7d7c175c1223dd93e09360ca5176a4d39d2a05ff99cfc0d07dde2a7d8ed7f0612b802a5d959cd7e9f5319fad686fd4cac474713"}, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e24, 0xae55, @mcast2, 0x9}, {0xa, 0x4e21, 0x6, @rand_addr="ca6caa0f8f892f5902dbcd5ad4ae0820", 0x800}, 0xc2d, [0x6, 0x82, 0x5ece, 0x3, 0x7f, 0x0, 0x2, 0x101]}, 0x5c) r5 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r6, r5) 13:37:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 13:37:27 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl(r1, 0x1000008912, &(0x7f0000000100)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) recvmmsg(r1, &(0x7f0000000a40)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/250, 0xfa}, {&(0x7f0000000200)=""/249, 0xf9}], 0x2, &(0x7f0000000340)=""/209, 0xd1}, 0x1}, {{&(0x7f0000000440)=@tipc=@id, 0x80, &(0x7f00000004c0)}, 0x8001}, {{&(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000580)=""/203, 0xcb}, {&(0x7f0000000740)=""/147, 0x93}, {&(0x7f0000000800)=""/249, 0xf9}, {&(0x7f0000000680)=""/127, 0x7f}], 0x4, &(0x7f0000000940)=""/254, 0xfe}, 0x7}], 0x3, 0x10100, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000b40)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x40000044}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x4000041) 13:37:28 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d986", 0x31, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:28 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa198) 13:37:28 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:28 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KIOCSOUND(r2, 0x4b2f, 0x976) 13:37:29 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa, 0x10, r1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:29 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x20000000) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:29 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dce47bf070") dup2(r1, r0) 13:37:29 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d986", 0x31, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:29 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000008f40)=[{{&(0x7f0000000100)=@un=@abs, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)=""/120, 0x78}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000000200)=""/191, 0xbf}, {&(0x7f00000002c0)=""/86, 0x56}], 0x5, &(0x7f00000003c0)=""/200, 0xc8}, 0x4}, {{0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f00000004c0)=""/23, 0x17}, {&(0x7f0000000500)=""/216, 0xd8}, {&(0x7f0000000600)=""/103, 0x67}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/173, 0xad}, {&(0x7f0000003800)=""/131, 0x83}, {&(0x7f0000000680)=""/20, 0x14}], 0x8, &(0x7f0000003940)=""/76, 0x4c}}, {{0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f00000039c0)=""/177, 0xb1}, {&(0x7f00000006c0)=""/38, 0x26}, {&(0x7f0000003a80)=""/99, 0x63}, {&(0x7f0000003b00)=""/239, 0xef}, {&(0x7f0000003c00)=""/29, 0x1d}, {&(0x7f0000003c40)=""/118, 0x76}], 0x6, &(0x7f0000003d40)=""/75, 0x4b}, 0x7ff}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000003dc0)=""/174, 0xae}, {&(0x7f0000003e80)=""/178, 0xb2}, {&(0x7f0000003f40)=""/219, 0xdb}, {&(0x7f0000004040)=""/159, 0x9f}, {&(0x7f0000004100)=""/15, 0xf}, {&(0x7f0000004140)=""/93, 0x5d}, {&(0x7f00000041c0)=""/204, 0xcc}], 0x7}, 0x1}, {{&(0x7f0000004340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000004600)=[{&(0x7f00000043c0)=""/66, 0x42}, {&(0x7f0000004440)=""/247, 0xf7}, {&(0x7f0000004540)=""/164, 0xa4}], 0x3}, 0x9}, {{&(0x7f0000004640)=@nfc, 0x80, &(0x7f0000004700)=[{&(0x7f00000046c0)=""/39, 0x27}], 0x1, &(0x7f0000004740)=""/162, 0xa2}, 0x55e}, {{&(0x7f0000004800)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000006880)=[{&(0x7f0000004880)=""/4096, 0x1000}, {&(0x7f0000005880)=""/4096, 0x1000}], 0x2, &(0x7f00000068c0)=""/75, 0x4b}, 0x7}, {{0x0, 0x0, &(0x7f0000008d80)=[{&(0x7f0000006940)=""/4096, 0x1000}, {&(0x7f0000007940)=""/160, 0xa0}, {&(0x7f0000007a00)=""/4096, 0x1000}, {&(0x7f0000008a00)=""/232, 0xe8}, {&(0x7f0000008b00)=""/108, 0x6c}, {&(0x7f0000008b80)=""/128, 0x80}, {&(0x7f0000008c00)=""/87, 0x57}, {&(0x7f0000008c80)=""/13, 0xd}, {&(0x7f0000008cc0)=""/139, 0x8b}], 0x9, &(0x7f0000008e40)=""/213, 0xd5}, 0x5}], 0x8, 0x1, &(0x7f0000009140)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009180)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000009280)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000092c0)={@mcast2, @dev={0xfe, 0x80, [], 0x1b}, @rand_addr="7c419f67168f4240f3d4c0f9ab2c0c57", 0x7fff, 0x7fff, 0x3ff, 0x400, 0x80000001, 0x2, r2}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="0000000000000000ecfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f4946420ce67b658e7902a58353fc8905e322ad249211d210", 0x44, 0x0) 13:37:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:29 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:29 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x4) 13:37:29 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) dup2(r1, r0) 13:37:29 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:29 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x2, 0x80) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000140)={0xfffffffffffffffd, 0x79, 0x6e}) ioctl(r0, 0x10000000000, &(0x7f0000000740)="986cf05a220dd5f667a8aed05afe5dda96ca0eff5e6cc7e3223c7beabc4fb6b1a6bb488b2f312bdbfe90d1ca2b3113bdf45398d17572bc490695841c422b40798d834ddd7b09e9f2ad2e3f558efd3034b45b592c0cc38d996508ffa40b8c1324cce410c267643d1fc9f4c1418c0977c99c8ba04f42da9ccfd26b4e369fc6cbdc3da1b577d08b1fcc28fffa0c4a4d2a0dc6eda3dc07e9d9cab70de6ca509ece125ed6c220a52c7555e2d28f6e58f48fa6c9d21e55267f6a1eecdaff1d340f1ea4eeef1ae54d759eceae2878a614790966af2f431065c9e094596df567a3522347f4f5bb2872f591be263b3eb58f82b2c23f228dfabac34e5f9ff43801f503fa33971b9d44b636635dd33d4f625a538789ce1e978478daa20f8e6cdd01e1f905403859f11faec86e1349224ec8c1a1b72d7d789efb17c670970d601d0f2803c6f870ca7826ea71e42414df9c124b0ee4320c7f17b52304486fc3bbe130302b2fc6e61f34e5c78b2b3dfd707b31551d88fd9df9627f223f09afa027c1f5bf94b45b43f342cc3ffee7f2c7c3cc58a413561cc8a2e1a9c903bbf01697332dc559a9edb47b78ccfc32f391788e19f8ac036a19ea03719583a5ea0e8b53f187ba31abad7b4068a26ef81ccfe4c182f185b561f5fc0f325883b74f42d0ff3f3bc8fb83f9f75d8bbaf476ada93d48090c0ceca7c651af32bae2860b3998a383c660f328ca29b868f9be66b8dc35f636f939dd0f8e08bb1a98e359c270c0c779cdf97f3c17e2fb6b5b33cc9728c3bffdde29061854758fd9608475a894b0de974656c29b0f150670b45886e992e6d3acc3db3507fc88a9f66f2819602482bdc7d1f1c7e87d9efdd939c3f9fab018718c3b2e8e06c691f51f93528e6e4e79795a37800ccf2eb8e58491b14d1a084071f2ed26d252a9aedcc5b83efb47ee874bdf0e84e48ce3a016805db3b3f6691e55ecc12bf58e5d480ea884908acc599a77332485c02737fefbc6d8f9c1c5b4024d947e9132fb48381c8fab7c0bc8ee3a33f821b750929e97b18602e3a3847842cb0b8a88f3094ae79a3a92a4ce4064b624125aaadaff059c14d0d7e658dbed0c2811dcbbf09af29c470d8e792984a5b634146b085882fd7e22a0670e81287098386d8e4602e6ec47260cd1241360f095b827a1314c4e0c4930b84c561534cfcfee9326c90984da31a2012a77a7e688871ed5a2c6d6699e1725eeada58c773362d21f21247851b79c358251136508891df5726d3434cf3e208214ce5bc0a2b870c7411cd8383a4ca657e19c5821e528695e811af1edcbc2742702af2a23205ccd235e2b1c68179963b8cca361fb22b924ff861ded5abc757d7cf46f10bbc7c9c915a889420dbdc531607be818027165dbc4425413468d3e3c7be8cea964fd8fb2068b9c340d6d5b41785b50069e939a0f75f8d1e431e1bec55f6737c59860b9f3cf1dbf5d15f3e9090ea9537cd0666740feb0cc0d669d153204e97b8695f8696638269921694e7e0cb07b231f5ec4f970d8733689cafcdd4ad2e00148d2bc9e389fc5338ed912a0bc7bea9bd2614fcc7353b5f41af2d3ad93999cbf9030831b7ebd170f7fd665715932bed10767fc37fadba018a1619033b20891b51eab8ecc481ad49b734d8944cefae3984404555296070e98de74475052170b392341b3cbfc16215d50f8e9536c6b962bc98a48a31995f54ff205e6b6963cf28f9d5cac3b2bb03bb5abf3214e6a9c0f46fe7f094043234c2996113c76abb6f22c36320bb1d7cdb2692766f03c1a013327caf05285db91140f81c1f10e71c1d50e03fc07b1f0fc3724c7728e29cc6de4f7c191f1fa3027f4a27f854cf2e5d0e6a215428469b5d57c41fe09afd532c1b066864e84329c5e5addeab308e52f93b35ec6a3d606c57b62fc299315e378846584cf893772c34bfa6f0d8ddeafb58d53d0f3ae4e5bf4842f70e4b4e46ff5a02715e815d53a509229206701d3e394f999cc522fd895706869e61b874ed85abfd9b5c87e9b248570bb06e8c259d274864639ad78d425402a2ed7a1634e78f3534282e109c93bead1b8e733b99601795a183cb840bdaa7538b619c843bc82ec198e05f4a5e5c9319e1e70ea7b3141d07e6a6b07a0377a0885402462d05de3ce8c524a4e1b5b740f58e8a356f32864631db05d4aea4d20a939bd3178995a54c63e65370a26b62cb07619247e84e70ca6c0ddf4b3885bba10d9b137b03d4a7d5261b8ffa586a8602ef72a90878b48eb511a9059ca84de363927fb8eeb580f495e8be4bafd593ee67cbd4d472d0a51db42e0bb2a1c2f422a42e00a57840177e8bd5ee1d0a15a168f59a4513dd781ca1674df1caeabe17e3b73762c4a8ab680e094101db92b1629486de39ef3b1176598aa3ac02188851dd4c44aa34adffb62164e5f21199afc444778f51e49c97511e2128f13d3b3642447f802e037be982bf034372c1fa4b478b8861551587b59766f8a7dceacb083712ee3063a92bd73bfff3bb416af6f5cf3ce82161d1e99a921b0fbd9c6758b02e7578a30b5389b404695cffa497ae8938e66b59e89af375e4ff191b8cd0293b662e2ddec2cc518a0d251a8b606dc74bdc99ede5c034748edb4f533458dee31b0377f2de16151f678c762ec85425a4a1d0ab9c84e377c50dc66810b3399e8b7050b2ee3b3e215b9bc341e4926d87dbc0e2a7352378389ddd1f35cb8a401f61225c3cb64d6e54f478657fcd82445a3fc30141b9ace5416fe929baf74476ee45c011deec4d0dfc887c6fade1c10bf90aabff7e01fbeb9b1d7beaa17a3a13015c7e95838cca86602fdaee506833aa5fce8889f74da22224839927cc0e9cd047f4f7c4ae820f0fc6ce0c931d02e6433972b4ca7f69e9f0c23541746348682edc427438134f8b0eebf82e82214033d5ca77f543dd1294218e9f23242bff0e83701baa63e039f6cb852f2f3e13b0a20bec2a8797f9380fb5c16404ae1a3d013210d7dac37d1241e816518a6d18282868fdb0a8c2547d81685b7441fdc2b809de38d45973eb3f38580af16ab312cbf716aa40e6d32bca5fcd86099a1c8dbde261b8b0517c83a4d036e34c7284e46bd71a3a77cba85f2c28f676ddb8f71a917697e1028db674d43955d406e0ddcfa3b58026c3d9be899ac12170dd3d9a23dbed83adcbfede93ac12a153eb24ea668768472d16fdd79b2dc1de63d84c8c459e6a0e851dd67c413eb066dacfeb97210d007872f9578c5b7ccbee4ae844562dc0bee85bb1c49216b4042e9ec1eb72d9493a89b88c16b8bfa2917f9b83493ca34a417100f0ca39c36d40a7ad6821e2276f71c07dbb6335ec419f1c433ac69626bb9d8cd6f451aa76399bb8d198aff4a1d57e7c2916a707ab9e8413d1a0f3956cc5b49fc1addf2e4af788e4e20f78bb4ac26c917cb20d3fef4527d35b70d659cc3e58c73fe5a70500fa8d1c2f0006cf37192e5028f49cfb6a697514ab7227b1d828b4b60d558b43ab3d323e05de5a2f25e2e5ac4c92e32942f9c7a12ad1dd58ee72dd540b97149c9cb4c8e27d1ca07f7eb649755f6eae9603b7244b4f20fa6aa5f0d787b84f733a9dd88c26d2dc3dbc59d7e2b43e581f1835ee13f1d6b3f9a69e7583febe431b2668a87ac876b757f247eeccb7e307a14294129faf3c1aac9cfd136c4bd637119a457a3901af76619994d6e4a13f997ab187658f652b368fedf0c44fb9b5758001b7fb5165ea5fddd3a91cfec70f8bced104603a6dee231d034d09f44abead5eba4736ad601bf02314e5a0ab7f07b6e1bc40df1907741533a4ba4945dcbd2715fd79e600acf27abeea1a7e3a34e1c77da04d00b05e8023ae20fc484b3f3803b80a0dac518b7635df3fda0091a266a627dfb12c958db257dc2ce72fb11e809606ce688b51c2928584e024d5898794f27a3056ec825efc17292e3d51180235b0eb324ae3fe0797b1a5eed68d0b01ff73f7d256c6df03048bd3584dd06fd3c6cc0e83fc6f43e7f8c791b94a4405aab297f194c129c9fb95a4417bde35727a83e1d644eea6b3f38a60f51314556a8962c40eacb817489cd9ec02b7380ed579bf0615cbe047dc5a3516ddb0faf13cb2b31cf1db8e83d9ac4e2ea5fb9467f55a78c42dd585189ed92fc9a5e65c8783bcc6c5660e6ce8a648e3653cd65f2711ac6fd1e0b5198186c67fa6075b042c19c398105d024f18f253e7b910e5a5a80b01394361f3e9d8b991f720284ff67ab47455df0b63a881c0233c69cb4c058e90535045c462d74a11879d3b0316ff43b13dd09dd5f603805ebd4378ef511e7dacc96d4c077b3ad408a15ef2d660375bb140f6c2ac45abbff8a979bf638e178b3308678ac7a31f98f4d4e16eaaf93b338cbc66a9f5518dc4107eb9c610703c27a81131d7248e598a0c37084623c02217aac1e93287ea0c02f1f32484cbab03ebed12d8e5feac85444e1b7917a85c9f2ab313c1ce2e4bba0439b31e2ebd7c367efffaf5ce435a74094c50639610fdea611fe8621a06b1f824c7cae3cc6692f9b8c359e3e86fab7895ea55cf450ed1ad43d85145ea93782a98e6a20d0f83f82f43d5df39182214fd907eeca3b59cb9f2a46f0a9cf81476641436a7c504337559fab56311a499529a45f1dc236f7eb0fca10da80a42020541e04195acd0dfbd6045207e64e68b5fdc142d5127f262f9cf58b29e80eaec447bfb2298d50d23d2a8829ae944beccb9f1fd4b6edf58ff3d9ea93da9be8f6a88dfb526b73cbd9b9218ec520d427d785ddcdf86a2f44eb64555c5af3d13bc177b7aebd8f84e316451114a19d082c464c2cdfa1a89b4da6392281efdec96d0b85563544752a74c6ff63cfefe89efd0422abb0dec327aafe807b04c29b292e76304843df4e1f4a511ff236ceba3ca386ef568bc28522be8ef7af85442362df28527c2c132c431c20c36d082bd87575bb683bff6f31bc8dac08ef96bf688ec2af3a098d73cbd0b59b13111e80ee7cebadda98ef2fd56616aea8ffcddb78c3877a2f63b409ed5415035dde80e5d7d79faf71b86c8b6c13ba42bd3e97a08b88eb1e8ca68de68150a38d808a1ca59ebd1e2ded62d359d19c90d4d2a4d6cf6e0b85022753bb22087c8aa94f4cc3efc9dff82f231c2e13cb3e23fd48ad5da2a229b28638bee3b9cda2be39fd4b3029f1c791b27425f839d37fb14a1abacc29b10932f1a0082b693944918687b2d6b2755675e83d7fe683928b152459b29b9bb5533d531cfeecb7c96089b20142f685d6b89b775bc9e90750d2818753406ce2ec4d652226b086abf5cd6f783e366d5772b1c2c9f1a6c10ecabdbda2e9b6183a68f4575a76087f9ba014a7646f6fde956fc573f8567b9e527a0532c47ab9231d06101d57cc5de56cde122c7fde448c0379b64a8232b9c25965e2a4021e311b05f93580d6311b47d7ab3c0cf9c5b27cf4941c0b0d6e65ae7bb1bda96f2cabd10d4f6e3f65942fa53ed521dfc72971502d0189551a2cccb3d9e53e7375b9195c9d706dff19834121476e984b1fd34dff6488f0916884fa01b8cb4cc8edd5f2d75911007656fa34d821c62351ef74a3e37abefdf6fd90c0dce2562ed385607246b14d5d4c1d7538d151f65e65ce45e777bb6fdd2ac330eaf757e60d4ced085e9de9571179132f0a87788b33e9c69868e20aea1994b14e05512e464274a89bc0264b20e0bd471f27eb36383f83bd06b9a501d866f97a0526e643c34a1227e0733279bf9e3ba3419a5aec71c55651b7b087dd5aaa960cae571f6a8e9ca0242f6489af6559df9cfe5eccee9d82026870275d") readv(r0, &(0x7f0000000000)=[{&(0x7f0000001740)=""/4096, 0x1000}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = dup2(r2, r0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000080)=""/76) 13:37:29 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:29 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d986", 0x31, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:29 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:udev_var_run_t:s0\x00', 0x24, 0x3) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x15da4d6fe70a3cef) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x7f5) dup2(r1, r0) 13:37:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:29 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)="a3c4f9a447493938878fb1e8c3ee3827435bf83d", 0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r2, r0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) prlimit64(r3, 0x0, 0x0, &(0x7f00000000c0)) [ 1512.382286] audit: type=1400 audit(1565530649.813:461): avc: denied { relabelto } for pid=19868 comm="syz-executor.4" name="UDP-Lite" dev="sockfs" ino=227414 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=rawip_socket permissive=1 13:37:30 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) sendmsg$nl_xfrm(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@delsa={0x78, 0x11, 0x420, 0x70bd2b, 0x25dfdbff, {@in=@local, 0x4d5, 0x2, 0x33}, [@srcaddr={0x14, 0xd, @in6=@ipv4={[], [], @multicast1}}, @user_kmaddress={0x2c, 0x13, {@in6=@dev={0xfe, 0x80, [], 0x20}, @in=@rand_addr=0x1, 0x0, 0xa}}, @ipv4_hthresh={0x8, 0x3, {0x20, 0x12}}, @ipv6_hthresh={0x8, 0x4, {0xb, 0x78}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000800}, 0x800) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:30 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) 13:37:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:30 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)=0x0) ptrace$setsig(0x4203, r3, 0x200, &(0x7f00000000c0)={0x1c, 0xff, 0x5}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)) 13:37:30 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) getresuid(&(0x7f0000000480)=0x0, &(0x7f00000004c0), &(0x7f0000000180)) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000001c0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f00000002c0)=0xfffffffffffffe17) r5 = geteuid() getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="02000000010003000000000002002bff", @ANYRES32=r1, @ANYBLOB="020002643b63ef1c41997a8f29517cc3dac000", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r5, @ANYBLOB="040004000000000008000200", @ANYRES32=r6, @ANYBLOB="10000700000000002000040000000000"], 0x44, 0x1) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000140)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:30 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:30 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:30 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:30 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa5", 0x34, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:30 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:30 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x56, &(0x7f0000000300)={@remote, @dev={[], 0xe}, [], {@canfd={0xd, {{0x4, 0x1, 0x2, 0x7fff}, 0x3e, 0x3, 0x0, 0x0, "30017ee947e211e5979be906f5861a9399fa3f04d6dfea0c0a0fd487a9cabd8cf88bafba0661766ec03d19b7679292286ce7d87bbba793692f4dd1b1b406875d"}}}}, &(0x7f0000000040)={0x1, 0x4, [0x83f, 0x79d, 0x408, 0xf5e]}) ioctl(r0, 0x4, &(0x7f0000000280)="11dca50d5e0bcfe47b57a13891d8ea006f48c4beefdea7b9e512752e7e8dbf701bc20f634957ada6b09f81e8dbdd1e6f42f82ff5a5d72f182ba5c48a392ce14dcf8ed7d590759f637ecdb640b07fe59a90bd1ba1be19d6d0e283fe81c2db65b44040964f7ed82ef69a135600"/127) r2 = dup2(r1, r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1bdb11abbae59622}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x100, r3, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x9}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0x8}}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @loopback}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0xc}}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x100000000}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x3edf235f1127a521}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x100}, 0x1, 0x0, 0x0, 0x10}, 0x80) 13:37:30 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:30 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2000, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r2, r0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000140)={'broute\x00', 0x0, 0x0, 0x0, [], 0x6, &(0x7f0000000000)=[{}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}]}, 0xd8) 13:37:30 executing program 0: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$setstatus(r0, 0x4, 0x2000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:30 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:31 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000000)) open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x40) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r2, r1) 13:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:31 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:31 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000180)="bdb6252ac0db2af4ce639f569c8cbfa2610a04fda0e73cf721800e2141001e749ba0945bd61937e5a42cb5a715d09cc16cc517a13c275e49b459f67902a583ebe687bdeb7f6a7c2ab1535dab6bebdca47900aabc4e2b13dd741ffc7745baf600"/105, 0xfffffffffffffd7f, 0x0) 13:37:31 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa5", 0x34, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:31 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:31 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) fcntl$notify(r0, 0x402, 0x80000025) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r3, r4) 13:37:31 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:31 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000080)="c9ea8e49caf6b3af04b2a171fc6baeee", 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKFRASET(r1, 0x1264, &(0x7f00000000c0)=0x10000) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r2, r0) 13:37:31 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0xfffffffffffffc67, 0x2, 0x6, 0x4}]}) setsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000000)=0xa07, 0x4) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:31 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:31 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x98) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:31 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, r0) 13:37:31 executing program 4: stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x88f37ee4d0d82e20, r0, 0x2) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fgetxattr(r1, &(0x7f0000000140)=@random={'btrfs.', '/selinux/relabel\x00'}, &(0x7f0000000180)=""/31, 0x1f) dup2(r3, r1) 13:37:31 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {}]}) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000001c0)) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000100)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:32 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa5", 0x34, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:32 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:32 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:32 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2400, 0x0) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000100)={0x3, 0x6, 0x2}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)=0x4) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:32 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001740)='/dev/vga_arbiter\x00', 0x2800, 0x0) getsockopt$inet_buf(r1, 0x0, 0xf11653300c1b2099, &(0x7f0000000000)=""/44, &(0x7f0000000080)=0x2c) accept4$unix(r2, &(0x7f0000001780)=@abs, &(0x7f0000001800)=0x6e, 0x80000) r3 = dup2(r1, r0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f00000000c0)={0x8, 0xff}) 13:37:32 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:32 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$VT_WAITACTIVE(r2, 0x5607) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r3, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x10001}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000000) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 13:37:32 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x7, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup3(r0, r0, 0x80000) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000240)=0xfffffffffffffffd) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000000)) read(r0, &(0x7f0000000140)=""/204, 0xcc) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f0000000100)=0x7fffffff, 0x4) 13:37:32 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000100)="bdb6252ac0db2afefcfc64b9c1c16c7f32c517a13c275e49b444860700000000000000cfc059f69f7b658e7902a58353fc8905e322ad249211d21009697a729839492166f26c", 0xff24, 0xe) 13:37:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:32 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x4) write$selinux_create(r1, &(0x7f0000000240)=@access={'system_u:object_r:passwd_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x2}, 0x47) r2 = socket$inet_udplite(0x2, 0x2, 0x88) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="bfbff1a91cd69c2dcfccf8779cb515d5d9113d60723922a2c1bd2fd9bb2a71ca22a07783", 0x24, 0x0) write$ppp(r1, &(0x7f00000002c0)="5970fc409bcb1b6dbaa0c7917bc2908742ea12ca418821cbd8c2fc158b724fb5d4df6483e5c5212f4afd0025c838efbf63610752252bb120125a42087878c06546cabf7ef95fcfde57fc41f9e9d576ec87952962dd", 0x55) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = dup2(r2, r0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000001c0)={'bridge0\x00', {0x2, 0x4e22, @multicast1}}) 13:37:33 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000140)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:33 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet6_udp(0xa, 0x2, 0x0) dup2(r0, r0) 13:37:33 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa51301", 0x36, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:33 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:33 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:33 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = dup2(r1, r0) write$UHID_CREATE2(r2, &(0x7f0000000080)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xd1, 0x3, 0x6, 0x80000000, 0x1, 0x0, "408659a179a163449b569df19a44d944fa2d865393539eacd7ca25f394e4e39856c631a0a63bd8a65982f232cf3a84ad989eb8bbc24ee2f23d6ee82f260a47de5cefd2e2f738c5a779a371b28e7fd83ab048334470cb03dd3b5b063fa133ec373281f2e94f18e03ec4b2b17e112079bb8b2b4df030df192de06ae9658fd1d8ef681d0225d06334b6dce8e4e9b72b58fc08e01c2835913e4b5f835b7944b657ad8bc3e16f46fd0dcaec145084d2d1728dad21ecf3813041d5d267a6711ff903403ca1dd609ea0621dfc1578483c7cde4bb5"}, 0x1e9) 13:37:33 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 13:37:33 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCCBRK(r2, 0x5428) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r0, r1) 13:37:33 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) rt_sigqueueinfo(r2, 0x34, &(0x7f0000000100)={0x1, 0xceb1, 0x939b}) 13:37:33 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5f070") ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) dup2(r0, r1) 13:37:33 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) 13:37:33 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpeername(r0, &(0x7f0000000200)=@l2, &(0x7f0000000280)=0x80) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4080, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x20, 0x8, "ed470dbf8b7a4f8ade32771ed127ada65c3910c530e0f4e1f9361f863a3779c7bb4f2abdc20fb661d33f78430562297488dfa2200ec42ce96ba033cda3cf97f0", "d4ef578a5a8ee4800909a69f6b8875672f57524812e060be54a4acf595a08fd0", [0xc3d4]}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:33 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) write$P9_RLINK(r2, &(0x7f0000000080)={0x7, 0x47, 0x2}, 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = getpgrp(0xffffffffffffffff) ptrace$poke(0x5, r3, &(0x7f00000000c0), 0x1f) dup2(r1, r0) 13:37:34 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa51301", 0x36, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:34 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:34 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8011}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r3, 0x4, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x4ef4, @link='syz1\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x24008000) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:34 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TCSETX(r1, 0x5433, &(0x7f00000000c0)={0x40, 0x2, [0x1, 0x6, 0x8, 0x7, 0x7], 0x6}) dup2(r0, r0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) 13:37:34 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:34 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r0) ioctl(r1, 0x1000008932, &(0x7f0000000200)="e47bf02100bdd5c05c415705ccc6bfce5e8fd88518290fdca92dbc831badc466c52fac5ce629c8286cc3251ca7ab170c91a0246cfeb089359881d049d97377691505000000301134d02dada9cf69a52bfca6ba1337ff9026c0507d1aa991f84c50d5de0c72ff6f06e311ff03bb68afcbfdabd95d05ed07030483cc9bd94e5b5b0eb91a63d9e1cc176c56e6b3942acd61b516a865fba4e1fd35c52847bed506dc7526d36ec122c06472fc57ac11d18870e636ad706873698d2361a7afbe537a5d8e09e703453d613c47d0c6327befe0a26a50194f9a34dca691618bb09a83f5c179b0503cc6db5d3485") inotify_init1(0x80800) dup2(r1, r0) 13:37:34 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486df9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) write(r0, &(0x7f0000000000)="58ecce3693dd4c914bd6c0af8ce41d7b8d730583586c23803ebf512511b024c760f880c442701bb0634113c5995e23872715de004253", 0x36) r2 = socket$inet6(0xa, 0x2, 0xfff00000000000) getsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000500)=""/67, &(0x7f0000000240)=0x43) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x200, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0xd02aee3989319105}, "53d8cbf785e3a40d", "4425b3750d713f055ae30406efe328e2", "a64c0678", "6630c3ba3db7a11c"}, 0x28) r4 = add_key(&(0x7f0000000100)='syz\x12\xfaller\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000180)={r4, 0xb9, 0xbe}, &(0x7f0000000440)=ANY=[@ANYBLOB="656e633d706b637331a2ac9a77683d777035313200000000000000000000000000000000edffffff0000000000000000000000000000000000000000000000e3d3a5809ab3259802d4e51d11d47fbd5493d6f02a24073ffd8e39fe9c595bca32422844668289cf1ee9c0e3ddbc3b8e1f9e98b5c4120995fdca46b805951ae91cbfcf69a698d1a1d8cb5e627f926e3a8b4e0afc1a"], &(0x7f00000002c0)="618e46a955d3dc94b2cadc2d155b83b13d63be994b6000ae9167eb860d3a47fbb10b1a8c4cc9590719524acdfc0ef268da57a1b912527158491088cdbd88d977fb8682e5a482e5b81ac13daf8423a4a24aeef1c92656fe3e374803346eb1e553e01f8932db9e998f07bcd1217d11937ef38137a6954dfbdb728e72dcaa50181624fc05cc17b9d5983f776de9df80deb94a9891b63bd9480a051d2aed1a0ef4d75fdc32cc8b55f2a19cb44f32ad4cb620d8b27b9f3ee839a804", &(0x7f0000000380)=""/190) 13:37:34 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000400)='id_legacy\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="d87777920ad0f5d0321c1203fcaad8bb66514c406195f200092abf753133ac7fbcd5bfd666d3bab34ebb66bbcb95c40e3a0b9d5c0f5bccbfa5f97a55267ce0bc2919751df8c5f45dfcc30cb93edb300fb90c8ad3fa2d2545bf28e5e93bb88f02142021558aaf40eed4bf9aec75bb3e9c4659419ddd409928b687aafc4e7859eead7cb8c02b3830e4289c998ba5815ece0e7f2955dc4661b561e69363538807bf60df2334d9a1", 0xa6, 0x0) keyctl$search(0xa, r1, &(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x1}, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.events\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f00000002c0)) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r5 = add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="30392dd188629c6e0ae5dfdae41d8ea1e7052b49f5ad7d74627eccf84fc16b0beff9a321c52bc4faeace4d01f7a2559ab2a6c6ad94c5555d3fa802e5650d7f89e9535320c41e", 0x46, 0x0) write$selinux_attr(r4, &(0x7f0000000540)='system_u:object_r:systemd_logind_var_run_t:s0\x00', 0x2e) keyctl$setperm(0x5, r5, 0x2000) r6 = dup2(r3, r3) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000200)={{0x8, 0x9, 0xd1e, 0x8}, 'syz0\x00', 0x3e}) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000000)=0x4) 13:37:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:34 executing program 4: r0 = socket(0x2, 0xa, 0xb3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) quotactl(0x1000, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000280)="290264dfaba58a81b49416c1519a67d3b49fb732809c1839ec1f1d2896f99d03c45f99193c3eae1989ee9a5bae05f8e7fa1a2be647af3a1e7a7104d33d83304142da28ffdb241558cb38b8b1c9254c5cf6b8161906ae08367d619cccf3ad4bd90a7e60adc80772611f8c9576ad0592b4204e37f81a9009d418070135b6ab87153e45010e48dcd89019a8faa1edd2bc8315396f1371c7df040eac09765dda885819c06749da3eef64") inotify_init1(0x80800) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000140)) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x1) r3 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x111000, 0x0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000000c0)=0x9) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0x7, &(0x7f0000000240)=0x2, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x211d49, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa02070000000086dd60b409000030000002000000000009000000ffffe0000002ff020000000000000200000000000001890090780009290060b680fa0000000000000040000000000103ffffffffffff00000000000000000000ffffac14ffbb"], 0x0) syz_emit_ethernet(0xffe8, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaa000000000000008137ffff001e0000ffe971c143ffffffffff0000ffffffffffffffffffff0000b08d039b0367b216cea56942549b5cecbbde434b488d4c00f0efd3d4131eedd9f79036f3442ee054a7804720c5bec84525a67616e2723393132794808635b82378a5d4dbc2e598ad8e863860b19b"], 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000180)) dup2(r3, r0) 13:37:34 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:35 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa51301", 0x36, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:35 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={r2, r3, r4}, 0xc) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:35 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") dup2(r1, r0) socket$nl_generic(0x10, 0x3, 0x10) 13:37:35 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$addseals(r0, 0x409, 0x2) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:35 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:35 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x59bb07, 0x0) recvfrom$unix(r0, &(0x7f0000000080)=""/124, 0x7c, 0x40000000, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x40000) dup2(r2, r1) 13:37:35 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendfile(r1, r0, 0x0, 0xfffffffffffffffa) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:35 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) dup2(r1, r0) 13:37:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x2) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000100)) 13:37:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:35 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:35 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:35 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) 13:37:35 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:35 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x111200, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x64, r4, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8000}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe4e}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffff000}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x7056293c51174353}, 0x4) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:iptables_exec_t:s0\x00', 0x25, 0x0) ioctl(r0, 0x8, &(0x7f0000000100)="e665c3079898c7991fb4ff60515a4da67979e9717b1e58a26307d1d6ba8b9f96e1c6c4e62c4190460421053a8e3309568da0a83c20f874816baef4f062d1f95501e977c6a8c8e2aed9b45fb23f8c2934ea2b0b796283b3a711ed5880c14b7fb7cbe04da27ca01a2232ce9e6be0f5e082d319e133804eef373b0a6fda835f06be44cbf5b95407ad048b68921f8e500b39058b7945ca6d4c0f6e0e765e995de4ec34880be3113bc16faa2f0aadee6be5") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:35 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = dup2(r0, r0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000000, 0x1, 0x0, 0xa, 0xc, 0x8, "99d1b0c7cfe19da90be9870ecb8419578c27dfe4e855c47764e07cf652198baa81bf5463a53736b83d8e1b04bdb206bca7ec793e5cb9ef61bd69978ab4bfb172", "7cdbd1397275044b19a3f85953c32132e399d7229c308e646981114a8c8df7e88bda5e54b023a67ff320eb309d859df6cc0f269015c7f665d228328b4fd43ddf", "8a8a40a590654c4bfe41e596a712a947667533a22308b66fe32b23af78dd7fe5", [0x7, 0x8001]}) socket$inet6(0xa, 0x800, 0x401) sendfile(r0, r0, &(0x7f0000000000), 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) 13:37:36 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:36 executing program 4: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r1) ftruncate(r0, 0x7ff) 13:37:36 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'ip_vti0\x00', {0x2, 0x4e23, @loopback}}) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9a45bfcfaeb65c4d4057af9cfd67925c1f4ce639f569cc16cc517a12c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc", 0x1baf841244cfeaaf, 0x3) 13:37:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:36 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="4bbc07eaa96500d9119df560a3806039", 0x10, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r2) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:36 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:36 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/244, 0x188}, {&(0x7f0000000000)=""/28, 0x1e8}, {&(0x7f0000000200)=""/104}, {&(0x7f0000000280)=""/222}, {&(0x7f0000000380)=""/107}, {&(0x7f0000000600)=""/134}, {&(0x7f00000004c0)=""/190}], 0xb) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) readv(r3, &(0x7f0000000a40)=[{&(0x7f0000000180)=""/66, 0x42}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r3, 0x0) 13:37:36 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000100)) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000140)=0x3, 0x4) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:36 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x28200, 0x0) write$P9_RSTAT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="670000007d0100000060000400ffff00000800000000000000000004400300000100f0000000000000000000000a002727656d31776c616e316895d479c4a10d3bc960b079ae1ffd5ac64a4c2605006e6f64657619002d6e6f646576dd29636365730000020100"], 0x67) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fsetxattr$security_ima(r1, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@v1={0x2, "3838f5ad26"}, 0x6, 0x2) write(r0, &(0x7f0000000140)="87e05ab62e8354048e2a42ee65ac6fd18e53f1e9248ace8bc0e6d8339662a45fe9db05243565e2142cd56fab693616b3e64e387cb918c1283c40e5c4625f0df2b9a87ec6b583a836853dba3c43d5b3b9c843d486b016604297803f6ec67774de2e6cb4b40c418468a95ad92c19af8d6f15032a28230f7ad293a178510f7952eb4ee15b9e7d5add7ba0682f028fb0345c1c9e6bd1bb6636f457546cbec9a7958561ab61e02d9b4bbe8b2c934cac2700ae2e4f607c2b9a798db8e552b4efbddb18edc07dc6cf8791de5a0ca450098dbd1b158c5a505046dc00fb46860ea615", 0xde) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x7f, 0x3}) syncfs(r0) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000004c0)={'nat\x00', 0x0, 0x4, 0x0, [], 0x6, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000480)}, &(0x7f0000000540)=0x78) write(r0, &(0x7f0000000300)="34379bb7e8c1c114727c2430ebde1fade72c7df8075b6e0e5855ce33dfaf0e6835ec997b2b2ed0ed32f7b998e661eecd595b5f59ea5df43ad5fbd5fb91882b50635f92d63fe599101ac5a281eb2580675b276a2238b187fe0e2682", 0x5b) 13:37:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f00000002c0)=[{r0, 0x1}], 0x2097, 0x0, &(0x7f0000000340), 0x8) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e005ae) shutdown(r1, 0x0) shutdown(r2, 0x0) 13:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:37 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000100)={0x8, 0xfffffffffffff801, 0x9, 0x0, 0x0, [{r2}, {r2, 0x0, 0x100000001}, {r1, 0x0, 0xfffffffffffffffb}, {r0, 0x0, 0x7fff}, {r2, 0x0, 0x8}, {r1, 0x0, 0xff}, {r1, 0x0, 0x5}, {r1, 0x0, 0x8001}, {r1}]}) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:37 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@nl=@proc, &(0x7f0000000000)=0x80, 0x80000) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='rose0\x00'}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:37 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x26ba, 0x0, 0x0, 0x800e00517) shutdown(r0, 0x0) fcntl$lock(r0, 0xb, &(0x7f0000000000)) recvfrom$inet(r1, 0x0, 0x100000279, 0x0, 0x0, 0x800e00521) shutdown(r1, 0x0) 13:37:37 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:37 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000140)={0x3c, @local, 0x4e21, 0x4, 'sed\x00', 0x20, 0x9, 0x72}, 0x2c) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r1, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(0x0, 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000280)=""/70, 0x46}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r4, &(0x7f00000034c0)=[{&(0x7f0000000040)=""/163, 0xa3}], 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x26ba, 0x0, 0x0, 0x800e00517) shutdown(r4, 0x0) poll(&(0x7f0000000000)=[{r3}], 0x1, 0xff) shutdown(r5, 0x0) dup2(r2, r3) shutdown(r3, 0x0) 13:37:37 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(0x0, 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:37 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) write$P9_RLOCK(r2, &(0x7f0000000180)={0x8, 0x35, 0x1, 0x2}, 0x8) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) write$P9_RLCREATE(r3, &(0x7f0000000100)={0x18, 0xf, 0x2, {{0x89, 0x3, 0x3}, 0xb0}}, 0x18) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(0x0, 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:37 executing program 0: openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:38 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:38 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0xc0, 0x0, &(0x7f00000004c0)=[@acquire={0x40046305, 0x1}, @exit_looper, @increfs={0x40046304, 0x2}, @clear_death={0x400c630f, 0x3}, @request_death={0x400c630e, 0x1}, @enter_looper, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000300)={@ptr={0x70742a85, 0x0, &(0x7f0000000100)=""/193, 0xc1, 0x0, 0x2b}, @ptr={0x70742a85, 0x0, &(0x7f0000000200)=""/195, 0xc3, 0x0, 0x1}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000380)={0x0, 0x28, 0x50}}}, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000400)={@ptr={0x70742a85, 0x1, &(0x7f00000003c0)=""/17, 0x11, 0x1, 0xd}, @fd={0x66642a85, 0x0, r0}, @fda={0x66646185, 0x7, 0x0, 0x3e}}, &(0x7f0000000480)={0x0, 0x28, 0x40}}}], 0xe4, 0x0, &(0x7f0000000580)="f9c2925e1314fbb10ed3a4f4f6c0a0e8de980ea3916267c472928629a3ff66e986e182f4490841261b9b07ba2e7be99b17b45cefe8b62f62e5e0b780d8d852a4fa4f76f1efd172938d568008f119035dd34864e5aeb82728f2d89887b0b76622be724456b23d17d4977e378a52eb7fa77099bfc004a258d725a278555dae7c165bd3ab979279cba6a846d65e194be16f0addb8b9ca81b262618bf9d0a60e76c264a4ff31518c728ae4fe94644179c13169c3ad6ca9999e668039990763de61f52adaee446bae7af06f1f963abbed8190053c8c3e09181a2ff1a823d24eb53eb1743159c5"}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) 13:37:38 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:38 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000002c0)=@buf={0xb2, &(0x7f0000000200)="b88f0c5c72589bfeb7e89d60453bcdf8b967fbbbd534b013af6841c46b426b933eb85858148b885d0030364159f2bab741383609fbe7dddba72fe95abaa18134f22063f5be53cebb802ba6b5a6e48b1829785aba2b75c6f61e9dd9f20c5417c10708e07fb73f0d04cb70be04719b2026d280486cb2fb1ced1767dce81881ba4239d574a8f001cd0c62f2fd02921221d9a8fd06f5f3750ef111ec87e32d4cc6a2e9a01c3dab91e0d69e61d9764c60046205e3"}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) r2 = dup2(r0, r1) ioctl(r2, 0x2, &(0x7f00000001c0)="941b5c8827bd5777206190b9d397c191881035b7f5297faace1e8fddd244b16f5d6f08ba0690cc5a5fe0d97c0299cd0d7de2e3feafe87d9814241707b8") ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000100)=""/133) 13:37:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000002800)=""/4096, 0x1000}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x26ba, 0x0, 0x0, 0x800e00517) shutdown(r0, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000)={0xb2d6}, 0x10) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) recvfrom$inet(r1, 0x0, 0x100000279, 0x0, 0x0, 0x800e00521) shutdown(r1, 0x0) 13:37:38 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:38 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) 13:37:38 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r3, 0x0, &(0x7f0000000140)="18a116eddf67a1a340de043867006a49e1557eb018c41c6742124e217bec1a44e6e2b2a7ce067b5acf93be8cc261e4d4ba9e0c7e6ee0969503d022c1f34252399a14ded53a14060cd355c325ec30367697d0e8f47aeb79684ff6c27b6b61b2c53d1d64b42a4fd286d0721804dacfb46b08428b25256bc69da079c867e2e827c9b9fc3919a721525a7eecd7") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e79a5a58353fc0400e322ad249211d21025697a7298", 0xffffffffffffff2a, 0x2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x7, 0x8000) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0xabc6248f6d901f75, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x432}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) 13:37:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(0x0, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/244, 0x188}, {&(0x7f0000000000)=""/28, 0x1e8}, {&(0x7f0000000200)=""/104}, {&(0x7f0000000280)=""/222}, {&(0x7f0000000380)=""/107}, {&(0x7f0000000600)=""/134}, {&(0x7f00000004c0)=""/190}], 0xb) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) readv(r3, &(0x7f0000000a40)=[{&(0x7f0000000180)=""/66, 0x42}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) shutdown(r3, 0x0) 13:37:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(0x0, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:38 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2, 0x0) connect$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r3 = fcntl$dupfd(r0, 0x406, r1) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000240)=0xdf, 0x4) mknodat(r3, &(0x7f0000000100)='./file0\x00', 0x40, 0xfffffff9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@mcast2, 0xffffffffffffff7f, 0x0, 0x1, 0x2, 0xfffffffffffffffb, 0x200000000ffff}, 0x20) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e7902a58353fc8905e322ad249211d21025697a7298", 0x44, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000280)={{0x0, 0x3, 0xffffffffffffffff, 0x1}}) 13:37:39 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(0x0, 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:39 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) 13:37:39 executing program 0: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/relabel\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl(r3, 0x0, &(0x7f0000000140)="18a116eddf67a1a340de043867006a49e1557eb018c41c6742124e217bec1a44e6e2b2a7ce067b5acf93be8cc261e4d4ba9e0c7e6ee0969503d022c1f34252399a14ded53a14060cd355c325ec30367697d0e8f47aeb79684ff6c27b6b61b2c53d1d64b42a4fd286d0721804dacfb46b08428b25256bc69da079c867e2e827c9b9fc3919a721525a7eecd7") pwrite64(r0, &(0x7f0000000080)="bdb6252ac0db2afefcfc64b9c1f4ce639f569cc16cc517a13c275e49b44486fb9debc996b2edd5cfc059f69f7b658e79a5a58353fc0400e322ad249211d21025697a7298", 0xffffffffffffff2a, 0x2) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x7, 0x8000) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0xabc6248f6d901f75, 0x70bd2d, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x432}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) 13:37:39 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:39 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f29", 0x1d, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:39 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:39 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:40 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:40 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, 0x0) 13:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:40 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:40 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f29", 0x1d, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:40 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600), 0x0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x100) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:41 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x180) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:41 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:41 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f29", 0x1d, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x180) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:41 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f29", 0x1d, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:41 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x180) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:41 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1c0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351d", 0x1c0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1c0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1e0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:42 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e6", 0x1e0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:42 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:42 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962", 0x24, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:42 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1e0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:42 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:42 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962", 0x24, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f0) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a", 0x1f8) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:43 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1f8) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:43 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a", 0x1f8) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:43 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fc) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:43 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fc) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fc) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:43 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962", 0x24, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:43 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:44 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:44 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1fe) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:44 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1ff) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:44 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830", 0x27, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d634", 0x1ff) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:45 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d986", 0x31, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:45 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) fchmod(r2, 0x100000004) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='lo\x00') setuid(0xee01) r3 = creat(&(0x7f0000000380)='./file0\x00', 0x0) ioctl(r1, 0xd8d2, &(0x7f00000004c0)="b647b23d0ee82916cf65f14849dbde55c2bea3c918b92e03b77128e834ac74f5739e6d982dd9d973c41a3c74c8e8a7687cd198189654802656f9a5eb421d3f1bfd9a06627751d6d5cf8366353fb1e09fc138963b58374215a0dfe857a88103fc7dbd0142521fbb031d638e8dc5c34a9b60761a2bc10b89ead1b2d3445503f989ab62d42f6d5c4de9830806ab6b017992c36559c354df0e5805527e4463c2c251d60850e4c3adcce1302327b9e7cc45590ddfa84ca54779e6b8691a50c16a6e23abc4d536f0d914312c9e23975e6075485ff87d60279de5d1299c8392895b328a088e5d0db10546") getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) tkill(r4, 0x3f) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x4e24, 0x6, @rand_addr="65a9abef010a7bda3abf8a1247043ac7", 0xe80}}, 0x0, 0x7, 0x0, "39286f2045f282486effe0df3a1c602da9b5e9fd4b1b63c413a59d25d7d7c175c1223dd93e09360ca5176a4d39d2a05ff99cfc0d07dde2a7d8ed7f0612b802a5d959cd7e9f5319fad686fd4cac474713"}, 0xd8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e24, 0xae55, @mcast2, 0x9}, {0xa, 0x4e21, 0x6, @rand_addr="ca6caa0f8f892f5902dbcd5ad4ae0820", 0x800}, 0xc2d, [0x6, 0x82, 0x5ece, 0x3, 0x7f, 0x0, 0x2, 0x101]}, 0x5c) r5 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r6, r5) 13:37:45 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:45 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830", 0x27, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(0xffffffffffffffff, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:46 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:46 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:46 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:46 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:46 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:46 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830", 0x27, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa198) 13:37:47 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772", 0x29, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:47 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:47 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:47 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa198) 13:37:47 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xa198) 13:37:48 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772", 0x29, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:48 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:48 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:48 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:48 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772", 0x29, 0x538c}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:48 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(0xffffffffffffffff, r2, 0x0, 0xa198) 13:37:49 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa198) 13:37:49 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa198) 13:37:49 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:49 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:49 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa198) 13:37:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0x0) 13:37:50 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f", 0x1c, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0x0) 13:37:50 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(0x0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:50 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0x0) 13:37:50 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b77211", 0x2a}]) socket$key(0xf, 0x3, 0x2) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 13:37:50 executing program 2: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="f71ef72c127de2c15f47abe5be94dedbf73403bf8ae8e441d2a9147f299d989071baa962dd8830b772111c048bfe55d9866cffa513018c", 0x37, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, 0x0, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0x0) 13:37:51 executing program 5: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) 13:37:51 executing program 3: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000a80)={0x0, 0x20}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_VL_CLR(r0, 0x7014) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_read_part_table(0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140), 0x0, 0x538c}]) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='$.vmnet0\x8f#\x00', 0xb, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) writev(r2, &(0x7f0000000280)=[{&(0x7f00000000c0)="dd", 0x1}], 0x1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000040)) 13:37:51 executing program 4: openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x6, &(0x7f0000000000)={0x0, 0x8, 0x1, @thr={&(0x7f0000000080)="1ea86b61553d215632dcb62f4ce20362354b8b7b0dbcdb50c0824fd005aeafacdffa494c5529080a067fd02f70ae78d25fa96c775e4a507efd9897a710f898a00d9e68ef9af22da726a0fcf629c750c7fc112746220551d77a5a4b18240475c7891e0e5c41231b2918943655433032df3a8b81f4216c9f939f12ecca94db43a2ba1499d643086f18cc858124c4fc8e6b0838cd6c0447c85f93ac42aa9e30873b01e98093d99243d495d2ffc5ee237addfc0aadd0bb4769a5698cad734800cf577002cd89c96e4faa811ded6b35fdccee25fadee30191aef664209f9e40343b9614289c3a3160b9e918183713a0399a64d645", &(0x7f0000000180)="b7c16d3dcbbbb149455d6c45af51a4ec3120ff058c45304adb0b1126790b1dee9e677c7264083d81b0b4a5dea15762d346d613248f892e040baa2058437527e8cf75f2a415c13d8f973bca1445992af08e0b27a3f8f0cc0e6e754b80b44ce8e1163b3e98f9edf0f1e11909c96b3d339dec43934f9f11a78be2aab9775b5ca2e46dee674485e3dfa296b18e7e33b6a6ec394aa454a6475e97e2c556106226bf71241879aa710ddb47a7928f6bb9506b263fcb7455d7f3dac33e58bf0205f295da6340532306f8f5c100908ae1f275"}}, &(0x7f0000000280)=0x0) timer_getoverrun(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x666d) sendfile(r1, r2, 0x0, 0xa198) [ 1534.017040] ================================================================== [ 1534.024659] BUG: KASAN: out-of-bounds in unwind_next_frame+0x169f/0x1810 [ 1534.031503] Read of size 8 at addr ffff8881a3b27e78 by task syz-executor.0/21505 [ 1534.039036] [ 1534.040667] CPU: 0 PID: 21505 Comm: syz-executor.0 Not tainted 4.14.138+ #30 [ 1534.047853] Call Trace: [ 1534.050454] dump_stack+0xca/0x134 [ 1534.054008] ? unwind_next_frame+0x169f/0x1810 [ 1534.058592] ? unwind_next_frame+0x169f/0x1810 [ 1534.063178] print_address_description+0x60/0x226 [ 1534.068020] ? unwind_next_frame+0x169f/0x1810 [ 1534.072619] ? unwind_next_frame+0x169f/0x1810 [ 1534.077216] __kasan_report.cold+0x1a/0x41 [ 1534.081455] ? unwind_next_frame+0x169f/0x1810 [ 1534.086043] unwind_next_frame+0x169f/0x1810 [ 1534.090458] ? retint_kernel+0x1b/0x2d [ 1534.094353] ? deref_stack_reg+0xe0/0xe0 [ 1534.098433] ? ptrace_may_access+0x34/0x40 [ 1534.102682] __save_stack_trace+0x7a/0xf0 [ 1534.106850] ? schedule+0x92/0x1c0 [ 1534.110398] save_stack_trace_tsk+0x34/0x40 [ 1534.114731] proc_pid_stack+0x194/0x270 [ 1534.118703] ? get_pid_task+0xa0/0x140 [ 1534.122593] ? lock_trace+0xc0/0xc0 [ 1534.126215] ? lock_downgrade+0x5d0/0x5d0 [ 1534.130367] ? check_preemption_disabled+0x35/0x1f0 [ 1534.135396] proc_single_show+0xf1/0x160 [ 1534.139461] seq_read+0x4f7/0x1180 [ 1534.143023] ? seq_lseek+0x3d0/0x3d0 [ 1534.146769] ? iov_iter_advance+0x1cf/0xc30 [ 1534.151113] do_iter_read+0x3e8/0x5b0 [ 1534.154968] vfs_readv+0xe6/0x150 [ 1534.158427] ? compat_rw_copy_check_uvector+0x300/0x300 [ 1534.163808] ? __fget+0x210/0x370 [ 1534.167262] ? lock_downgrade+0x5d0/0x5d0 [ 1534.171407] ? lock_acquire+0x12b/0x360 [ 1534.175384] ? check_preemption_disabled+0x35/0x1f0 [ 1534.180420] ? check_preemption_disabled+0x35/0x1f0 [ 1534.185481] ? __fget+0x237/0x370 [ 1534.188968] do_preadv+0x189/0x230 [ 1534.192512] ? do_readv+0x2e0/0x2e0 [ 1534.196137] ? do_clock_gettime+0xd0/0xd0 [ 1534.200281] ? __fget_light+0x174/0x200 [ 1534.204256] ? do_syscall_64+0x43/0x520 [ 1534.208229] ? SyS_writev+0x30/0x30 [ 1534.211866] do_syscall_64+0x19b/0x520 [ 1534.215792] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1534.220988] RIP: 0033:0x459829 [ 1534.224168] RSP: 002b:00007f15b2a58c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1534.231900] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 1534.239182] RDX: 10000000000002a1 RSI: 0000000020000480 RDI: 0000000000000004 [ 1534.246463] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1534.253735] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15b2a596d4 [ 1534.261004] R13: 00000000004c6b38 R14: 00000000004dbcc8 R15: 00000000ffffffff [ 1534.268302] [ 1534.269922] The buggy address belongs to the page: [ 1534.274861] page:ffffea00068ec9c0 count:0 mapcount:0 mapping: (null) index:0x0 [ 1534.283006] flags: 0x4000000000000000() [ 1534.286997] raw: 4000000000000000 0000000000000000 0000000000000000 00000000ffffffff [ 1534.294882] raw: 0000000000000000 0000000100000001 0000000000000000 0000000000000000 [ 1534.302754] page dumped because: kasan: bad access detected [ 1534.308461] [ 1534.310088] Memory state around the buggy address: [ 1534.315025] ffff8881a3b27d00: 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 [ 1534.322389] ffff8881a3b27d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1534.329774] >ffff8881a3b27e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1534.337141] ^ [ 1534.344460] ffff8881a3b27e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1534.351828] ffff8881a3b27f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1534.359181] ================================================================== [ 1534.366543] Disabling lock debugging due to kernel taint [ 1534.372154] Kernel panic - not syncing: panic_on_warn set ... [ 1534.372154] [ 1534.379617] CPU: 0 PID: 21505 Comm: syz-executor.0 Tainted: G B 4.14.138+ #30 [ 1534.388016] Call Trace: [ 1534.390631] dump_stack+0xca/0x134 [ 1534.394176] panic+0x1ea/0x3d3 [ 1534.397376] ? add_taint.cold+0x16/0x16 [ 1534.401380] ? retint_kernel+0x2d/0x2d [ 1534.405302] ? unwind_next_frame+0x169f/0x1810 [ 1534.409889] end_report+0x43/0x49 [ 1534.413345] ? unwind_next_frame+0x169f/0x1810 [ 1534.417926] __kasan_report.cold+0xd/0x41 [ 1534.422076] ? unwind_next_frame+0x169f/0x1810 [ 1534.426665] unwind_next_frame+0x169f/0x1810 [ 1534.431076] ? retint_kernel+0x1b/0x2d [ 1534.434970] ? deref_stack_reg+0xe0/0xe0 [ 1534.439038] ? ptrace_may_access+0x34/0x40 [ 1534.443284] __save_stack_trace+0x7a/0xf0 [ 1534.447443] ? schedule+0x92/0x1c0 [ 1534.450988] save_stack_trace_tsk+0x34/0x40 [ 1534.455310] proc_pid_stack+0x194/0x270 [ 1534.459292] ? get_pid_task+0xa0/0x140 [ 1534.463194] ? lock_trace+0xc0/0xc0 [ 1534.467000] ? lock_downgrade+0x5d0/0x5d0 [ 1534.471193] ? check_preemption_disabled+0x35/0x1f0 [ 1534.476223] proc_single_show+0xf1/0x160 [ 1534.480285] seq_read+0x4f7/0x1180 [ 1534.483840] ? seq_lseek+0x3d0/0x3d0 [ 1534.487581] ? iov_iter_advance+0x1cf/0xc30 [ 1534.491916] do_iter_read+0x3e8/0x5b0 [ 1534.495737] vfs_readv+0xe6/0x150 [ 1534.501228] ? compat_rw_copy_check_uvector+0x300/0x300 [ 1534.509416] ? __fget+0x210/0x370 [ 1534.512878] ? lock_downgrade+0x5d0/0x5d0 [ 1534.517029] ? lock_acquire+0x12b/0x360 [ 1534.521013] ? check_preemption_disabled+0x35/0x1f0 [ 1534.526039] ? check_preemption_disabled+0x35/0x1f0 [ 1534.531075] ? __fget+0x237/0x370 [ 1534.534545] do_preadv+0x189/0x230 [ 1534.538092] ? do_readv+0x2e0/0x2e0 [ 1534.541718] ? do_clock_gettime+0xd0/0xd0 [ 1534.545869] ? __fget_light+0x174/0x200 [ 1534.549858] ? do_syscall_64+0x43/0x520 [ 1534.553836] ? SyS_writev+0x30/0x30 [ 1534.557460] do_syscall_64+0x19b/0x520 [ 1534.561352] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1534.566532] RIP: 0033:0x459829 [ 1534.569714] RSP: 002b:00007f15b2a58c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1534.577423] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 1534.584687] RDX: 10000000000002a1 RSI: 0000000020000480 RDI: 0000000000000004 [ 1534.591953] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1534.599218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f15b2a596d4 [ 1534.606498] R13: 00000000004c6b38 R14: 00000000004dbcc8 R15: 00000000ffffffff [ 1534.614126] Kernel Offset: 0x1ee00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1534.625047] Rebooting in 86400 seconds..