)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r9, &(0x7f0000000380)={0xa0, 0x0, 0x8, {{0x3, 0x1, 0x20, 0x3, 0x1000, 0xffff, {0x4, 0xbb9, 0x829f, 0x2, 0x3, 0xffffffff, 0x7, 0x81, 0xff, 0x100000000, 0x0, r10, r11, 0xa2, 0x89}}, {0x0, 0x1}}}, 0xa0) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000380)=0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x22000, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=r6, @ANYBLOB="2c2ffa671754c1dcac4b6dee6a9067729903705f697d3d4f70ac8d364fd0898092ee9cd43bdb0a6de24f04dc3f27ec11f92cdde804b46b6aaea0", @ANYRESDEC=r11, @ANYBLOB=',blksize=0x0000000000003000,blksize=0x0000000000001000,allow_other,hash,audit,fscontext=root,smackfsroot=ppp0+:,euid>', @ANYRESDEC=r12, @ANYBLOB="2c7063723d30303030303030303030303030303030303033312c6673757569643d66393039320062342d796533c42d643339632d656539392d39373262316666312c7375626a5f757365723d766c616e300000f6ffffffffffffff002c646f6e745f686173682c00"]) sendto$inet6(r4, &(0x7f0000000080)="dd", 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup2(r0, r1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0), 0x10) open(0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) dup3(r0, r2, 0x0) 14:59:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x0) read(r4, &(0x7f0000000000)=""/250, 0xedf1d44) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r7, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r7, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0xf642e7e) setsockopt$inet_MCAST_JOIN_GROUP(r7, 0x0, 0x2a, &(0x7f0000000380)={0x1000, {{0x2, 0x4e24, @remote}}}, 0x84) pipe(&(0x7f0000000640)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r8, 0x8941, 0x0) read(r8, &(0x7f0000000200)=""/250, 0x50c7e3e3) r9 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x6100) ftruncate(r9, 0x208200) r10 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r9, r10, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000340)=0x5) 14:59:59 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") socket$packet(0x11, 0x3, 0x300) write(0xffffffffffffffff, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 14:59:59 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 14:59:59 executing program 1: clone(0x0, &(0x7f0000000000)="77dd226afa12844110e4c3af69aa2d8d374f8a146ff685fdd4e193708c07b6bb596683edcb338b00fe721808e39554bd17b572946d6c559a9bfbadeba33a1f2b2c50134612d92e7c603239390f8eca2e5d086de72e5a04d2b795ca09ff016b4ba232e2b1fe90e87e32b5a23c0b8ad4c13f340e530a474de65cea5fcdbae40f59e0ff11f3142d9195672866c0a62419e01965d72391", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000140)) r0 = epoll_create1(0x0) r1 = dup2(0xffffffffffffffff, r0) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000980)=[{&(0x7f0000000780)="abc9717d0f7e25377a28c53be6e89e871cdff26f16f57d4f3a9a5de8f5f83c92b644cee4b76dd99f76fc5d57c48600503c833c6fbf718400932de73738f07e52353e236c9ace04c014ab604fcd2a6a37faa14ca42b122a6cf9bbcc8fe38472b68be3808a91a3094b257b54a67d62542096fbfdf642285678891cc8c83b4b5f3a01661df92a71fb2bb2ba3cf069de71a283d5960fbabb92d7c915"}, {&(0x7f0000000880)="13d9ac6bde0e33e90b47b7db3d84dee5f78057dcf1c1c2bf1bb5c767a75818e40af466f8316b9b84fe7dd6ff24e1c92f07d4f3775f687a362dddf0779d335b6dbb8903729f4b1e1017aad2bdc52d909e8f067f51b1e747f2d94c7bc022b5ec026c590745eff07f0e7957dbd86d2ed442b6f00655b73a36af1a2fec78bb59ec980b9d40e364f2b609226f4b97755527f85dc1a33386d74fb78ba45e5704eade941d9911b703b6506ff256682616203b6625b057001a9600fc1d7526327e0034fa00034dc6740357b5957a9876e2bf26ab7e662597b76e64"}], 0x20000000000000a7, 0x81806) sendfile(r4, r5, 0x0, 0x20000102000004) flock(r5, 0x8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r3}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@dev={0xfe, 0x80, [], 0x20}, @in=@empty, 0x4e23, 0x7fff, 0x4e23, 0x81, 0x2, 0x20, 0x120, 0x33, r3, r6}, {0xffffffff, 0x9, 0x10000, 0xde, 0x3, 0x7, 0x8}, {0x9, 0xffffffffffffffff, 0x7, 0x5}, 0xb31e3d8, 0x6e6bb5, 0x613680fb018e81a0, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x25}, 0x4d4, 0x32}, 0xa, @in6=@rand_addr="bbc9ff08f9daa2ff907e83b513790acd", 0x3507, 0x4, 0x0, 0x40, 0x7, 0x1ff, 0x1}}, 0xe8) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5}) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r7, r8, 0x0, 0x20000102000004) r9 = socket$inet(0x2, 0x800, 0x0) splice(r8, &(0x7f00000006c0), r9, &(0x7f0000000700), 0x9, 0x1) r10 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r11 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r11, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r10, r11, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r10, 0x4c01) r12 = fcntl$getown(r10, 0x9) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r13) sendmsg$nl_generic(r2, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80804000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x23c, 0x32, 0x100, 0x70bd2a, 0x25dfdbff, {0x11}, [@nested={0x228, 0x32, [@typed={0x8, 0x7c, @pid=r12}, @typed={0x4, 0x8c}, @generic="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", @typed={0x8, 0x76, @str='+\x00'}, @typed={0x8, 0x6c, @ipv4=@remote}, @typed={0x8, 0x65, @uid=r6}, @generic="8578e44f882b5e3e6b564369ab581daf699028360901804c23634083a9e2f39312d6acc1adabb71db36eec2cd26b8792c4707622deee665dff5edfe2ca008e5ce00d62313ceb2ed62251c126ac1a67d14007aec5ef0376e5648a93ec45102855a75ec8fff0efdb84a44e752faaaf29ff", @typed={0x8, 0x69, @uid=r13}, @generic="27015254ba86d65c57e6545d09a3a53ee155041a68176a1702336a02f5570a20e32e38ab642c01e6eb8c0e7521ff3de8b784999b4148ef2d022199ed7d8ddfba7c6a26a7811691a5e395e0c9dc7b0d25fd1432c1200b49a17ec65d6c7dfc08b2790a2df64ebe49ec80eda60a15073b7f10c8b1e21fd6cd3c9029bec0bab79a6ee290a17b333b"]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4020800}, 0x22000000) 14:59:59 executing program 0: r0 = socket$inet6(0xa, 0x800, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(r0, r1, 0x0, 0x88001) sendmmsg(r0, &(0x7f0000005780), 0x4000000000000d2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$sock_timeval(r2, 0x1, 0x1b, 0x0, 0xffffffffffffffc8) listen(r2, 0x80) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x402600, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x200000, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r6, &(0x7f0000000580)='net/snmp6\x00') write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@random={'security.', 'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11'}, &(0x7f0000000500)=""/86, 0x56) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r8 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f00000000c0), 0x8) accept4(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000001c0)=0x80, 0x800) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000180)=""/31) [ 946.155286] device lo left promiscuous mode 14:59:59 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 14:59:59 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:00 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r0 = socket(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$packet(0x11, 0xa, 0x300) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x20000001) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8004700d, 0x0) geteuid() request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffb) keyctl$describe(0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) r5 = open$dir(0x0, 0xa000, 0x0) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r6, 0x80084503, &(0x7f0000001100)=""/4096) read(r6, &(0x7f00000004c0)=""/176, 0xb0) openat(r5, &(0x7f0000000000)='./file0\x00', 0x2042, 0x0) io_setup(0x9, &(0x7f0000000440)) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000080)) io_setup(0x81, &(0x7f0000000480)=0x0) io_cancel(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x8, r7, &(0x7f0000000300)="6aeabdedcc0fd1da", 0x8, 0xffffffffffffffff}, 0x0) 15:00:00 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd4}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd89") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x0) read(r4, &(0x7f0000000000)=""/250, 0xedf1d44) fcntl$setstatus(r2, 0x4, 0x6100) fdatasync(r1) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r7 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r7, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r7, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0xf642e7e) setsockopt$inet_MCAST_JOIN_GROUP(r7, 0x0, 0x2a, &(0x7f0000000380)={0x1000, {{0x2, 0x4e24, @remote}}}, 0x84) pipe(&(0x7f0000000640)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r8, 0x8941, 0x0) read(r8, &(0x7f0000000200)=""/250, 0x50c7e3e3) r9 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x6100) ftruncate(r9, 0x208200) r10 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r9, r10, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000340)=0x5) 15:00:00 executing program 0: r0 = socket$inet6(0xa, 0x800, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(r0, r1, 0x0, 0x88001) sendmmsg(r0, &(0x7f0000005780), 0x4000000000000d2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$sock_timeval(r2, 0x1, 0x1b, 0x0, 0xffffffffffffffc8) listen(r2, 0x80) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x402600, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x200000, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r6, &(0x7f0000000580)='net/snmp6\x00') write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@random={'security.', 'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11'}, &(0x7f0000000500)=""/86, 0x56) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r8 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f00000000c0), 0x8) accept4(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000001c0)=0x80, 0x800) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000180)=""/31) 15:00:00 executing program 1: clone(0x0, &(0x7f0000000000)="77dd226afa12844110e4c3af69aa2d8d374f8a146ff685fdd4e193708c07b6bb596683edcb338b00fe721808e39554bd17b572946d6c559a9bfbadeba33a1f2b2c50134612d92e7c603239390f8eca2e5d086de72e5a04d2b795ca09ff016b4ba232e2b1fe90e87e32b5a23c0b8ad4c13f340e530a474de65cea5fcdbae40f59e0ff11f3142d9195672866c0a62419e01965d72391", &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000140)) r0 = epoll_create1(0x0) r1 = dup2(0xffffffffffffffff, r0) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000980)=[{&(0x7f0000000780)="abc9717d0f7e25377a28c53be6e89e871cdff26f16f57d4f3a9a5de8f5f83c92b644cee4b76dd99f76fc5d57c48600503c833c6fbf718400932de73738f07e52353e236c9ace04c014ab604fcd2a6a37faa14ca42b122a6cf9bbcc8fe38472b68be3808a91a3094b257b54a67d62542096fbfdf642285678891cc8c83b4b5f3a01661df92a71fb2bb2ba3cf069de71a283d5960fbabb92d7c915"}, {&(0x7f0000000880)="13d9ac6bde0e33e90b47b7db3d84dee5f78057dcf1c1c2bf1bb5c767a75818e40af466f8316b9b84fe7dd6ff24e1c92f07d4f3775f687a362dddf0779d335b6dbb8903729f4b1e1017aad2bdc52d909e8f067f51b1e747f2d94c7bc022b5ec026c590745eff07f0e7957dbd86d2ed442b6f00655b73a36af1a2fec78bb59ec980b9d40e364f2b609226f4b97755527f85dc1a33386d74fb78ba45e5704eade941d9911b703b6506ff256682616203b6625b057001a9600fc1d7526327e0034fa00034dc6740357b5957a9876e2bf26ab7e662597b76e64"}], 0x20000000000000a7, 0x81806) sendfile(r4, r5, 0x0, 0x20000102000004) flock(r5, 0x8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r3}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@dev={0xfe, 0x80, [], 0x20}, @in=@empty, 0x4e23, 0x7fff, 0x4e23, 0x81, 0x2, 0x20, 0x120, 0x33, r3, r6}, {0xffffffff, 0x9, 0x10000, 0xde, 0x3, 0x7, 0x8}, {0x9, 0xffffffffffffffff, 0x7, 0x5}, 0xb31e3d8, 0x6e6bb5, 0x613680fb018e81a0, 0x1, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x25}, 0x4d4, 0x32}, 0xa, @in6=@rand_addr="bbc9ff08f9daa2ff907e83b513790acd", 0x3507, 0x4, 0x0, 0x40, 0x7, 0x1ff, 0x1}}, 0xe8) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5}) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r7, r8, 0x0, 0x20000102000004) r9 = socket$inet(0x2, 0x800, 0x0) splice(r8, &(0x7f00000006c0), r9, &(0x7f0000000700), 0x9, 0x1) r10 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r11 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r11, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r10, r11, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r10, 0x4c01) r12 = fcntl$getown(r10, 0x9) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r13) sendmsg$nl_generic(r2, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80804000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x23c, 0x32, 0x100, 0x70bd2a, 0x25dfdbff, {0x11}, [@nested={0x228, 0x32, [@typed={0x8, 0x7c, @pid=r12}, @typed={0x4, 0x8c}, @generic="1c2b4396e2314cd42c22816ecf3d76eb1253a6eddf9982e258fabcd7ffad3933174b84ef00a4db83b69e92170f7c4d11e89de4342d51f1759a1af1c67dccf1588d291fa6339b4d47096df3b0f3a958ecffb1b5e0bd0bc3e0d8a07ee0bd31cc533b7961a66fc75eff4d5c63f01a99708cca9b90d048fbc14615c5aba7bad90ef639831511525c5b4e08dc1b9d6abc6ce5e79ea79ab933f8794b1c50ee834680239b9e3ad491595fbccbf1afb100501d51aff30641fae0f0185c56e4c99937e9a8ea26f10f70c1a3bca263d4d22d61653ff2b7f8fc9eefa7a21ee6f2baec43fab8ad0c77fdaf8d75cd6dbfc06afd8790bc490e5b95035001a54e53ec89bdc960", @typed={0x8, 0x76, @str='+\x00'}, @typed={0x8, 0x6c, @ipv4=@remote}, @typed={0x8, 0x65, @uid=r6}, @generic="8578e44f882b5e3e6b564369ab581daf699028360901804c23634083a9e2f39312d6acc1adabb71db36eec2cd26b8792c4707622deee665dff5edfe2ca008e5ce00d62313ceb2ed62251c126ac1a67d14007aec5ef0376e5648a93ec45102855a75ec8fff0efdb84a44e752faaaf29ff", @typed={0x8, 0x69, @uid=r13}, @generic="27015254ba86d65c57e6545d09a3a53ee155041a68176a1702336a02f5570a20e32e38ab642c01e6eb8c0e7521ff3de8b784999b4148ef2d022199ed7d8ddfba7c6a26a7811691a5e395e0c9dc7b0d25fd1432c1200b49a17ec65d6c7dfc08b2790a2df64ebe49ec80eda60a15073b7f10c8b1e21fd6cd3c9029bec0bab79a6ee290a17b333b"]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x4020800}, 0x22000000) 15:00:00 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:00 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd4}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd89") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:01 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x3) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(r0, r1, 0x0, 0x88001) sendmmsg(r0, &(0x7f0000005780), 0x4000000000000d2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$sock_timeval(r2, 0x1, 0x1b, 0x0, 0xffffffffffffffc8) listen(r2, 0x80) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x402600, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x200000, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) syz_open_procfs(r6, &(0x7f0000000580)='net/snmp6\x00') write(r4, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) lgetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=@random={'security.', 'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11'}, &(0x7f0000000500)=""/86, 0x56) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r8 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f00000000c0), 0x8) accept4(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000001c0)=0x80, 0x800) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000180)=""/31) 15:00:01 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd4}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd89") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:01 executing program 4: r0 = socket(0xa, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24}, 0x1c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) getsockname$inet(r2, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000100)=0x10) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1) 15:00:01 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000001080)=@un=@abs={0x1}, 0x80) bind(r3, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x2, 0x2, 0x3, {0xa, 0x4e23, 0x2, @loopback, 0x8}}}, 0x80) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000180)=0x7, 0x396) r4 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x2, &(0x7f0000000240)) r5 = dup(r4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x45}}, 0x1) ioctl$FS_IOC_SETFLAGS(r5, 0x40046602, &(0x7f0000000640)=0x1) r7 = inotify_init() lseek(r7, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x0) r8 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(r8, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket(0x200000000010, 0x2, 0x0) write(r9, &(0x7f0000000040)="2400000024007ffc00000100000000000000f6ff01000000000000000c00000000007162", 0x24) setsockopt$inet_tcp_int(r9, 0x6, 0x11, 0x0, 0x0) r10 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x800, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x9, 0x0, 0x100000093) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1}, 0x11) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r11 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x1) ftruncate(r11, 0x2007fff) sendfile(r5, r11, 0x0, 0x8000fffffffe) 15:00:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x400000)=nil, 0x400000, 0x100000a, 0x11, r5, 0x1d) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r6 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0xc32f, &(0x7f0000000440)=0x0) ftruncate(r7, 0x48280) io_submit(r8, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f0000000000), 0x2d19e6145c68928}]) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000000140)={&(0x7f000029c000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10) fcntl$setstatus(r6, 0x4, 0x40400) write$FUSE_WRITE(r6, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x3) r9 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x6, 0x4a400) ioctl$BLKBSZSET(r9, 0x40041271, &(0x7f0000000280)=0x1) 15:00:01 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd6}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:01 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd4}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd89") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:01 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, 0x0, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:01 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/ip_tables_names\x00') r2 = dup(r1) writev(r1, &(0x7f0000001280), 0x5) sendfile(r2, r1, 0x0, 0x4000000000dc) r3 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000001100)=""/4096) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYRES16], 0xfffffe87) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000001100)=""/4096) write$P9_RSTATFS(r1, &(0x7f0000000040)={0x43, 0x9, 0x1, {0x401, 0x8000, 0x0, 0x8, 0x9, 0x80, 0x8, 0x6, 0x4bf}}, 0x43) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000dc0)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000e00)={@mcast2, r5}, 0x14) r6 = dup3(r4, r1, 0x80000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r6, 0xc0405405, &(0x7f00000012c0)={{0x3, 0x0, 0x7, 0x1, 0x7ff}, 0x2, 0x8, 0xffffffff}) 15:00:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x400000)=nil, 0x400000, 0x100000a, 0x11, r5, 0x1d) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r6 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0xc32f, &(0x7f0000000440)=0x0) ftruncate(r7, 0x48280) io_submit(r8, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f0000000000), 0x2d19e6145c68928}]) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000000140)={&(0x7f000029c000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10) fcntl$setstatus(r6, 0x4, 0x40400) write$FUSE_WRITE(r6, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x3) r9 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x6, 0x4a400) ioctl$BLKBSZSET(r9, 0x40041271, &(0x7f0000000280)=0x1) 15:00:02 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000002d00), 0x80000000000027a, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x70881, 0x0) write(r2, &(0x7f0000000380), 0xfffffffe) ftruncate(r3, 0xd) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$void(r0, 0x5451) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)=@secondary='builtin_and_secondary_trusted\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$netlink(0x10, 0x3, 0x0) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080480500000046000107a27700141900040010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) splice(r5, 0x0, r6, 0x0, 0x200, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'no\x00', 0x4000}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r8 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r8, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f00000001c0), 0xfffffef3) bind$unix(r9, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) 15:00:02 executing program 3: bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000001100)=""/4096) read(r1, &(0x7f0000000340)=""/250, 0xfa) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fcntl$getown(0xffffffffffffffff, 0x9) truncate(&(0x7f0000000200)='./bus\x00', 0x8003) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) write$binfmt_misc(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797a311644b9e711590eeb2251dc9532be6536e0bf5aa13b8ec26e59211526d508f2f498e98263a13e32316e535fed803c11cb52af0061b9cdb2000000307e2c481492c97cdd05b6c37cb1df732ea6706e58295d300474905d48148cce8db380d6c16dad6c8c373d002c41fbed78b35efe672f1416ddc7711f4c3519d0dfb9c21f1a"], 0x61) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="7200000000000000000080101000000005000000aa00000000000600000000000000000000000000000000000000000008000000000000000000000030efa95d34bfd80000008000"/106], 0x1) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r5, 0x407, 0x0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r5, 0x0, r6, 0x0, 0x30005, 0x0) epoll_wait(r5, &(0x7f00000003c0), 0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0x3ec) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') lstat(&(0x7f0000000080)='./bus\x00', 0x0) write$FUSE_ENTRY(r3, 0x0, 0x0) fchownat(r3, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1800) sendfile(r3, r4, &(0x7f0000000040), 0x8000fffffffe) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000300)) 15:00:02 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd6}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:02 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x400000)=nil, 0x400000, 0x100000a, 0x11, r5, 0x1d) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r6 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0xc32f, &(0x7f0000000440)=0x0) ftruncate(r7, 0x48280) io_submit(r8, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f0000000000), 0x2d19e6145c68928}]) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f0000000140)={&(0x7f000029c000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10) fcntl$setstatus(r6, 0x4, 0x40400) write$FUSE_WRITE(r6, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x3) r9 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x6, 0x4a400) ioctl$BLKBSZSET(r9, 0x40041271, &(0x7f0000000280)=0x1) 15:00:02 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0), 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:03 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd4}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd89") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x8000) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000001100)=""/4096) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000000)=""/42) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) unlink(&(0x7f0000000300)='./bus\x00') lseek(r1, 0x0, 0x2) sendfile(r1, r3, 0x0, 0xfffffffffffffffc) sendfile(r1, r3, 0x0, 0x8000fffffffe) 15:00:03 executing program 1: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selin\t\x00/status\x00', 0x0, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x20141042, 0x0) read$FUSE(r1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xffffffffffffff59) fstatfs(r0, &(0x7f0000000240)=""/38) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000980), 0x19, 0x0) openat$cgroup_ro(r5, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x0) r6 = creat(&(0x7f0000000100)='./bus\x00', 0x100) write$binfmt_aout(r2, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x2ae) r7 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendfile(r6, r7, 0x0, 0x5a92) sendfile(r7, r7, &(0x7f00000000c0), 0xbf99) 15:00:03 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd6}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:03 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0), 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:04 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd4}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd89") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:04 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) memfd_create(&(0x7f0000000340)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000002c0)={0x0, @multicast2, 0x4e24, 0x0, 'rr\x00', 0x10, 0x0, 0x76}, 0x2c) r1 = fcntl$getown(0xffffffffffffffff, 0x9) epoll_create1(0x80000) r2 = syz_open_procfs(r1, &(0x7f0000000180)='fd/4\x00') ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000480)='./bus\x00') write(r4, &(0x7f00000001c0), 0xffffffe0) read(r3, &(0x7f0000000200)=""/250, 0xfffffffffffffef6) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000003c0), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) getsockname(r4, 0x0, &(0x7f0000000380)=0x216) socket$netlink(0x10, 0x3, 0xa) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) faccessat(r3, &(0x7f0000000000)='./bus\x00', 0xa, 0x1000) ftruncate(r6, 0x200005) sendfile(r5, r6, 0x0, 0x8000ffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) finit_module(r2, &(0x7f0000000440)='\xea\xd1\x1f\x9d\xfb\xa4\xa3\xcf\x03x\x85\xa1/\x90\xe3lan0\x00', 0x3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000540)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff2000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f00000004c0)="99a1883664d6409a6ff718e5e9fae2b27900cd210c6945514326cfd6b4e7307ecaf6ff3391d20907f804ab556c68e2d504ee0b7553a37906d8e69f32fb57358facec495bb020448bdf296da6a62f66b13ecbf8c57c74ad5bae3a40a22ae086e30b8d44e5571b36d74d54cc71", 0x6c, r5}, 0x68) 15:00:04 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r0, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) splice(0xffffffffffffffff, &(0x7f0000000400), r1, &(0x7f0000000440), 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r1) r4 = creat(&(0x7f0000000880)='./file1\x00', 0x0) r5 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000004c0)={@ipv4={[], [], @loopback}, 0x71}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000240)={0xf736, 0x7f, 0x7, 0x7, 0x11, 0x3, 0xc0000000000000, 0x7fff00000000, 0x3}) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r5, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r6 = getegid() fcntl$getflags(r3, 0x401) ioctl$TUNSETGROUP(r4, 0x400454ce, r6) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') fsync(r5) write$P9_RSTATu(r5, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x3, 0x80000001, {0x56, 0x2, 0xfffffffffffffc00, {0xf6, 0x2a}, {0x4, 0x5}, @period={0x58, 0x100, 0x3f, 0x9, 0x7ff, {0x94bc, 0x2, 0x5, 0x1f}, 0x3, &(0x7f0000000480)=[0x0, 0x5, 0x0]}}, {0x53, 0x100000001, 0x6, {0xa22}, {0x6c8, 0x401}, @ramp={0xf38, 0x3, {0x80, 0x0, 0x0, 0x8}}}}) r7 = socket$key(0xf, 0x3, 0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0x6, &(0x7f0000000100)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r9 = dup2(r8, r8) setsockopt$inet_int(r9, 0x0, 0x32, &(0x7f00000001c0)=0x1000000, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r9, 0x29, 0x41, &(0x7f0000000a40)=ANY=[@ANYBLOB="66690312ee0a394e1919c2cdced96c74657200000000000000000000001b22548905378301be0c77640000000000000000000000000000007f000000eb17d49fdae82a492d676454fc1dd8b2cf3d576114fa182311e4f4a088656c030720fe8a3d75debad48d390f38aae7c3a3ac864f8017a7a4f680923517d76415116cf56c2f3f54d190ca4daf15496033f8b4ef42644d97f4d7bc41718cf62ba1aad730a5b708e87a363cbf6063707b75a6127dfa037b8e70914e6b36e5e5571020e020ecf7b27ad704b01c74b42bfbd5aa5a031af218a3e9c64e57066abc1fcf735501b4a2031350aebd724ed2a93a6ddd6bc0080cba9d6a96bbab59b6106509537adb17b171192c360df5dcd089f65ed4560666db4813ae515a4fe90548d15006ce31ff98c9a2f7c3fca43753366490081f9368205a8f745702818b02000000000000003cd99e85276601da5c57b71a6e4fec901aaacd524fccfb1e244f00"/368], &(0x7f0000000040)=0xa3) ioctl$int_in(r3, 0x0, &(0x7f00000001c0)) write$binfmt_script(r5, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x12c) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, r7, 0x0) 15:00:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r1, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x20) r4 = creat(&(0x7f0000001400)='./file0\x00', 0x126) write$P9_RREMOVE(r4, &(0x7f0000000280), 0x1033b) r5 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ftruncate(r6, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_tcp_buf(r7, 0x6, 0xb, &(0x7f0000001440)=""/146, &(0x7f00000002c0)=0x92) r9 = open(&(0x7f0000000300)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r9, 0x0) read(r7, &(0x7f0000000000)=""/250, 0x128b9372) close(r5) fdatasync(r4) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) creat(&(0x7f0000000440)='./bus\x00', 0x84) creat(&(0x7f0000000100)='./file0\x00', 0x0) 15:00:04 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:04 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0), 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:04 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0), 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:05 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966", 0x62) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:05 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0), 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:05 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r0, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) splice(0xffffffffffffffff, &(0x7f0000000400), r1, &(0x7f0000000440), 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r1) r4 = creat(&(0x7f0000000880)='./file1\x00', 0x0) r5 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000004c0)={@ipv4={[], [], @loopback}, 0x71}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000240)={0xf736, 0x7f, 0x7, 0x7, 0x11, 0x3, 0xc0000000000000, 0x7fff00000000, 0x3}) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r5, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r6 = getegid() fcntl$getflags(r3, 0x401) ioctl$TUNSETGROUP(r4, 0x400454ce, r6) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') fsync(r5) write$P9_RSTATu(r5, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x3, 0x80000001, {0x56, 0x2, 0xfffffffffffffc00, {0xf6, 0x2a}, {0x4, 0x5}, @period={0x58, 0x100, 0x3f, 0x9, 0x7ff, {0x94bc, 0x2, 0x5, 0x1f}, 0x3, &(0x7f0000000480)=[0x0, 0x5, 0x0]}}, {0x53, 0x100000001, 0x6, {0xa22}, {0x6c8, 0x401}, @ramp={0xf38, 0x3, {0x80, 0x0, 0x0, 0x8}}}}) r7 = socket$key(0xf, 0x3, 0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0x6, &(0x7f0000000100)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r9 = dup2(r8, r8) setsockopt$inet_int(r9, 0x0, 0x32, &(0x7f00000001c0)=0x1000000, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r9, 0x29, 0x41, &(0x7f0000000a40)=ANY=[@ANYBLOB="66690312ee0a394e1919c2cdced96c74657200000000000000000000001b22548905378301be0c77640000000000000000000000000000007f000000eb17d49fdae82a492d676454fc1dd8b2cf3d576114fa182311e4f4a088656c030720fe8a3d75debad48d390f38aae7c3a3ac864f8017a7a4f680923517d76415116cf56c2f3f54d190ca4daf15496033f8b4ef42644d97f4d7bc41718cf62ba1aad730a5b708e87a363cbf6063707b75a6127dfa037b8e70914e6b36e5e5571020e020ecf7b27ad704b01c74b42bfbd5aa5a031af218a3e9c64e57066abc1fcf735501b4a2031350aebd724ed2a93a6ddd6bc0080cba9d6a96bbab59b6106509537adb17b171192c360df5dcd089f65ed4560666db4813ae515a4fe90548d15006ce31ff98c9a2f7c3fca43753366490081f9368205a8f745702818b02000000000000003cd99e85276601da5c57b71a6e4fec901aaacd524fccfb1e244f00"/368], &(0x7f0000000040)=0xa3) ioctl$int_in(r3, 0x0, &(0x7f00000001c0)) write$binfmt_script(r5, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x12c) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, r7, 0x0) 15:00:05 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:06 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, &(0x7f0000000480)=[{&(0x7f0000000040)=""/4, 0x4}], 0x1, &(0x7f0000002440)=""/73, 0x49}}], 0x1, 0x0, &(0x7f0000002640)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') sendfile64(r0, r0, 0x0, 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@mcast2}}}, &(0x7f0000000640)=0xe8) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='/usr/sbin/ntpd\x00', 0xf, 0x0) clock_gettime(0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000003c0)='erspan0\x00', 0x10) umount2(&(0x7f0000000180)='./file0\x00', 0x2) sendto(r0, &(0x7f00000001c0)="7199c425584cf4b15b099c8d9d7aa294f5de9a", 0x13, 0x20000010, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @loopback}, 0x4, 0x0, 0x2, 0x2}}, 0x80) write$evdev(r0, &(0x7f00000000c0)=[{{0x0, 0x7530}}], 0x10) pwritev(r0, &(0x7f0000001400), 0x2a6, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x20000102000004) r5 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r5, 0x80084503, &(0x7f0000001100)=""/4096) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) ppoll(&(0x7f0000000400)=[{r0, 0xc8}, {r0, 0xa018}, {r4}, {r5, 0x400}, {0xffffffffffffffff, 0x1043}, {r2, 0x1}, {r2}], 0x7, &(0x7f00000004c0)={r6, r7+10000000}, &(0x7f0000000500)={0xffffffff86952363}, 0x8) [ 952.745527] audit: type=1401 audit(1571151606.189:50): op=fscreate invalid_context=9C [ 952.910863] audit: type=1401 audit(1571151606.359:51): op=fscreate invalid_context=9C 15:00:06 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:06 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966", 0x62) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:06 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000004) r3 = fcntl$dupfd(r2, 0x0, r0) connect$inet(r3, &(0x7f0000000700)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000500)="00abe6d29e6101cb8b41eea5cf2e67fea541e9b7b65fe42e517d5f81d2919e1b2f4cf7f77a16fc3e961a0847916c7c2d9b77cd3160567341263cf19b3b2c6177e7065dda850c756c06aede12e9da8118bb5464ad07fa6146f6903ee57345cbd7551f547bdbe947b4f9a0b28cf29a28eda534fc6e2c9bf2c36c87da9ad79e6e7090", 0x4202692d7f740df1, 0x4000801, 0x0, 0xfffffffffffffeda) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'}) recvfrom$inet(r0, &(0x7f0000000440)=""/98, 0x7cd97198ffceeca1, 0x0, 0x0, 0xffffffffffffffae) fcntl$getown(0xffffffffffffffff, 0x9) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r5, 0x4c01) fcntl$getown(r5, 0x9) r7 = syz_open_procfs(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r7, 0x0, 0xfffffffffffffd4f) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = creat(0x0, 0x0) ppoll(&(0x7f0000000700)=[{}, {r8, 0x1141}, {0xffffffffffffffff, 0x3342}, {r9}, {r10, 0x10}], 0x9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = creat(0x0, 0x0) ppoll(&(0x7f0000000700)=[{}, {r11, 0x1141}, {0xffffffffffffffff, 0x3282}, {r12}, {0xffffffffffffffff, 0x360}, {r13, 0x10}], 0x6, 0x0, 0x0, 0x0) read(r11, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet(r11, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'caif0\x00', 0x101}) r14 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r15 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r15, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r14, r15, 0x0, 0x20000102000004) r16 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r17 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r17, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r16, r17, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r16, 0x4c01) r18 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) read(r18, &(0x7f0000000740)=""/270, 0x10e) 15:00:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x103}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) close(r0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000040)={0x1, 0x4, 0x1000, 0x0, &(0x7f0000000100), 0x95, 0x0, &(0x7f0000000200)="7c240924e66f27cd6ce6f45a480645675869ebf38a473bb1ca38889079379c593f13f8c5835310d233e5e3d073bbf7015a2b1b233db6021e10f10f4f53c3d45d4fed876617541cf219149119f92951dcc3bd933fe117c90b0eb69ca7f8842a370b98f04dabb70d3772eed05d28d694e62303d9a7d1d33df13113f640377ed1e1332be02b580f87b5152c06bd716e008e712d9eb937"}) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) inotify_init1(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0xfd1, 0x0, 0x7ff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000400)={'raw\x00', 0x2, [{}, {}]}, 0x48) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) munlockall() write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6(0xa, 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000014c0), 0x1000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r6 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r6, 0x2081fc) write$P9_RLERRORu(r6, &(0x7f0000000300)={0x16, 0x7, 0x1, {{0x9, 'fdinfo/3\x00'}, 0x5}}, 0x16) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="140040b5"]}) ioctl(r3, 0x8, &(0x7f0000000380)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/exec\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$nl_generic(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000480)={&(0x7f0000001480)=ANY=[@ANYBLOB="14000000160000082cbd700000000022b672f855"], 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) gettid() 15:00:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x26e, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x2b3f2b374dea38ea, &(0x7f00000017c0)={@mcast2, 0x0}, &(0x7f0000001800)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'gretap0\x00', r1}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x200000, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x200000, 0x0) write(r3, &(0x7f0000000340)="026d80bf61423cbc6cfcec1d0124c335de24fae4c0fee3dd75a83b6d8154d68a81c9f20bff4c55243160552a6a8a9303135b51b414c7018071c704ace3e3ade7be948246195e93e06ae99f6e14af66983ba0cdac5f14de2c", 0x58) ftruncate(r4, 0xd) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = open(0x0, 0x0, 0x0) execve(0x0, &(0x7f00000003c0)=[&(0x7f0000000200)='gretap0\x00', &(0x7f00000000c0)='\x10'], 0x0) pwritev(r6, &(0x7f0000000100), 0x3a3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000300)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0x78ff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000180)={'icmp\x00'}, &(0x7f00000002c0)=0x1e) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x40) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) r7 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 15:00:06 executing program 4: syz_open_dev$mice(&(0x7f0000000080)='/dinputLiice\x00', 0x0, 0x2000) r0 = eventfd(0x100000001) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000002c0)=0x7, 0x4) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r2) r5 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={@empty}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) write$P9_RFLUSH(r5, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$TUNSETOWNER(r3, 0x400454cc, r6) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) fsync(r5) pipe(&(0x7f0000000500)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r7) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0e05403, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ac0), &(0x7f0000001b00)=0xc) epoll_ctl$EPOLL_CTL_DEL(r7, 0x2, 0xffffffffffffffff) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r8, &(0x7f0000007e00), 0x40000000000025d, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r9, &(0x7f0000007e00), 0x40000000000025d, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r9, 0x6, 0x14, &(0x7f0000000300), 0x2f6) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x3, 0x80000001, {0x56, 0x2, 0xfffffffffffffc00, {0xf2, 0x2a}, {0x4, 0x5}, @period={0x58, 0x0, 0x3f, 0x9, 0x7ff, {0x94bc, 0x2, 0x5, 0x1f}, 0x0, 0x0}}, {0x53, 0x100000001, 0x6, {0xa22}, {0x0, 0x401}, @ramp={0xf38, 0x3, {0x80, 0x0, 0x0, 0x8}}}}) socket$key(0xf, 0x3, 0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0x6, &(0x7f0000000100)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$int_in(r4, 0x0, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x1) 15:00:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_buf(r1, 0x0, 0x24, &(0x7f0000000040)=""/124, &(0x7f0000000140)=0x7c) r2 = creat(&(0x7f0000000480)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x80) lseek(r2, 0x0, 0x2) sendfile(r2, r3, 0x0, 0xfffffffffffffffc) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000580)={0x5, 0x3, 0x0, 0x0, 0x2, [{}, {}]}) 15:00:07 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:07 executing program 1: openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) read$FUSE(0xffffffffffffffff, &(0x7f0000000840), 0x1000) pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000080)=',', 0x1}], 0x1) socket(0xa, 0x1, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r4, r5, 0x0, 0x20000102000004) r6 = socket$netlink(0x10, 0x3, 0x0) sendfile(r6, r3, 0x0, 0x6) perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x70, 0x3a, 0x8, 0x5, 0x20, 0x0, 0x7, 0x80, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x6, @perf_config_ext={0x9, 0x7}, 0x4448, 0xfffffffffffffffe, 0x81, 0x3, 0x1, 0x40, 0xfff8}, r0, 0xd, r2, 0x8) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r7, r8, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r7, 0x4c01) r9 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r10 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r9, r10, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r9, 0x4c01) dup2(r9, r7) dup2(r2, r1) read(0xffffffffffffffff, &(0x7f0000000400)=""/249, 0x50c7e60f) 15:00:07 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966", 0x62) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:08 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:08 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:08 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80000) ustat(0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, 0x0, 0xfffffffffffffda0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) fsetxattr$security_evm(r0, 0x0, &(0x7f0000000380)=@md5={0x1, "839f87f3687a18129e230941a26d2cd6"}, 0x11, 0x1) shutdown(r3, 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x20000, 0x0) flistxattr(r5, &(0x7f0000001600)=""/223, 0xdf) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x350, &(0x7f00000015c0), 0x0, 0x0, 0x17f}, 0x40002240) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x2800, 0x0) write(r6, &(0x7f0000001700)="3002b14b2217b458ed660ce70e73cb7fbd6f0b0779439af79518b77123e9f9a92e343a5c27a8060000000000005640ed", 0x30) poll(0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='mountstats\x00') preadv(r7, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r8 = accept4$unix(r1, &(0x7f0000001540), &(0x7f0000000140)=0x6e, 0x80000) setsockopt$sock_int(r8, 0x1, 0x2f, 0xfffffffffffffffe, 0x0) r9 = dup(r7) writev(r9, &(0x7f0000001500)=[{&(0x7f00000003c0)}, {&(0x7f0000001400)="277fa908f7bf7b0191f920cba67130e2372c40a89752c9134da9bdd25b738e2f67fcd21537f50463d162dde29212ce55086867e9178887794f0b1e69c31e3c73a184f701d573484614829c64b8c6d1defc7da11967f24ce46b60ba8e36f6de93435703be0a1d1d798111f6400050083e770330fbc3dbf37a5d4aeddc926b91ff4df54fa2", 0x84}, {&(0x7f00000014c0)="005843ef3fc692b1792db5d2be9e901e7d4356b3b0e847f7a1", 0x19}], 0x3) write$eventfd(r2, &(0x7f0000000340)=0x2, 0x8) read(r1, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:08 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000200)="c7444321c1292ed59696bbd748162bd241bd3b0c4b2a6ee105b406385c1df3fd138a119740278dc4229ba392fec84da7a4e7ed1dfb7118a8872c6df67562ea334953fb8bf16706dc7bfba81e11607544404f9b01b5410637fb02d122f6ad9d8ea64fefca98e719578ae59763c12da43cdfd2e5106c1c10c07dc83d75eed1c8494c239fa4a0f22ec0d8654b1f196c9101ce4d171bca32107f3ab8890ce3589fcef6e6c8b4eab82e1a8b8ab55624e011df9381a552eb07d32bf2096480226ffedab616710a20199c623a735a0c35593dbb8d5d73ece454aea37b16fecfc86fdaea99621a") write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x422101, 0x2) lseek(r1, 0x0, 0x4) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0xc3edef499d253ae3) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r2, 0x4c01) fdatasync(r2) fsetxattr$security_evm(r1, &(0x7f0000000000)='secu\x06\x00', 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000180)=0x1) 15:00:08 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b77091", 0x93) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:09 executing program 0: pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x9f, 0x0) ppoll(0x0, 0x0, &(0x7f0000000380)={0x77359400}, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000003c0), 0x4) write(r1, &(0x7f00000001c0), 0xfffffef3) fremovexattr(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000a40)=""/250, 0xffffff72) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) sendfile64(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x0, @multicast2, 0x4e22, 0x1, 'lc\x00', 0x0, 0x0, 0x39}, 0x2c) r2 = socket$inet6(0xa, 0x2, 0x0) getpid() ioprio_get$pid(0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) waitid(0x2, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file1\x00', &(0x7f0000000180)='trustect\x00\x00\xd4\x00\x00\x00\x00\x00\x00\x00\x7f\xff\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffe74, 0x2) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'veth0\x00', 0x103}) close(r3) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000040)={0x1, 0x4, 0x1000, 0x0, &(0x7f0000000100), 0x13e, 0x0, &(0x7f0000000200)="7c240924e66f27cd6ce6f45a480645675869ebf38a473bb1ca38889079379c593f13f8c5835310d233e5e3d073bbf7015a2b1b233db6021e10f10f4f53c3d45d4fed876617541cf219149119f92951dcc3bd933fe117c90b0eb69ca7f8842a370b98f04dabb70d3772eed05d28d694e6"}) r4 = syz_open_dev$char_usb(0xc, 0xb4, 0xfffff02f) preadv(r4, &(0x7f0000000340), 0x0, 0x10400002) 15:00:09 executing program 1: bind$netlink(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0xdfedf534d1677a51) ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) write$nbd(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="6744669800000000000000000000000000000000e9e4cfd07b5cf8cd9762139bcddff5f587b6fb484996f6422d573e425b4c86052d14f331c3f0a4876f8551712fe7d41993e1fd2543a3b84c8ba2d52a858e4d627caf3a87a5e1b50d3be5d855cd04a27a34762d68a708d920303218ef1a4922d54c097002137e225e1486af76abba142baa35d56f11df2d427c2bea43"], 0x79) fchdir(r2) r3 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) truncate(&(0x7f00000000c0)='./bus\x00', 0x8000) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e74703cad1efd94cb111bdd474a999c4e405afae64fc43ffdef72ec08f53bec"], 0x78) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) syz_genetlink_get_family_id$tipc2(0x0) lstat(&(0x7f0000000080)='./bus\x00', 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) fchownat(r3, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1800) sendfile(r3, r4, &(0x7f0000000040), 0x8000fffffffe) 15:00:09 executing program 3: write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000380)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000080)='\b\x00', 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) clone(0x1110000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x2081fc) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x2eb, 0x8000, 0x3, 0x1, 0x200}, 0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) setsockopt$inet_group_source_req(r1, 0x0, 0x7b, &(0x7f0000001100)={0x4, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x104) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) read(0xffffffffffffffff, &(0x7f0000000100)=""/4096, 0x1000) syz_open_procfs(0x0, 0x0) 15:00:09 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:09 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b77091", 0x93) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:09 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b77091", 0x93) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000001100)=""/4096) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000001100)=""/4096) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000002100)=""/4096) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000280)=""/221) socket$inet6(0xa, 0x1, 0x0) r3 = open(&(0x7f0000000940)='./bus\x00', 0x0, 0x8) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x27) getsockopt$inet6_udp_int(r3, 0x11, 0xb690d8ff2775702f, &(0x7f0000000040), &(0x7f0000000080)=0x4) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r4, 0x8922, &(0x7f0000000180)={'\xff\x01\x00', @ifru_map={0x1ff, 0x0, 0xffff, 0x2, 0x1, 0x9}}) listen(r3, 0xb4ef23) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x6, 0x5, 0x1, 0x7}, {0x6, 0x7, 0x81, 0x7}, {0xffff, 0xff, 0x3f, 0x40}]}, 0x8) r5 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ifreq(r5, 0x8922, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_data=&(0x7f0000000140)="60fe0ed6c27dda5081cd7ef86766c244ea874cf81cd848521f9984dafef8353a"}) 15:00:10 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b77091", 0x93) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:10 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:10 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0xa88, 0x0) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) 15:00:10 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b77091", 0x93) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:10 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) clone(0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0), &(0x7f0000000300)) ioctl(r0, 0xc0084905, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x80820}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x6440, 0x2) read(r4, &(0x7f0000000780)=""/245, 0xf5) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r5 = creat(&(0x7f0000000400)='./file0\x00', 0x104) openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = creat(&(0x7f0000000480)='./bus\x00', 0xfffffffffffffffd) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB="000326bd7000fcd0df2501000000000000000080000000000000b0d873e040ac9e210342715a496926847d8edff51f9445ba878f615a78170b660cfa58b7dd97ff4694372e2ce5c1fe849184c183a209000000000000000032be93cbc929301f0dfcb39141ae5c94583d24be3b73e4d82bbe166cc9681115a342b8481248fd3df5ecf7a34db4b3ac8686d8b5e84fe3eded7d0244a4a332c4e2186ad0ae73cf3726bb5fe91756e3c9d479392542e83a2f678a426bf8828d8dcaf650c28e5b9af0119215800d9a7316e4972632155889e0af65f6cd0d402b936a6df8f749ca2608ea936e862025546e15b33b29d137032d8e18796f77ed86f39c46e1cbea9df0413d8551b94aae0acd640b9d2efb6a97e5e5f50500dbe5c3a51d5cc3d3938d697f9d8ecd631a62cb5a58ddc8d8cf669c212063bd70ce890ba4be44cff53ab262ef43f84ae6ff62f05a0bc3a57a88bdc3fd9f96de780b12a5ff1ffe4207c05f6edb60f6eaf9ed2cf034eb09fe2f9a99d69deafa010a5498e8fd796970810782fc67de1ca168a0c5f6ef84c2252333b0cf6a4b3d45eabe361c09b4387d76b1f18efe4d8353aa7819950f7b25d7cac939157c2d8609c2c4236bc2d94535febacc1c689d4addceefab3c56d74a29acec51171b22048a06cb8cbe4397a64f3392b8f9e905370969bbffd1dfef0250981e45f09aac7484890000006cc0ea799b8d"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) fcntl$setstatus(r7, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r9 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x420040) ioctl$EVIOCGREP(r9, 0x80084503, &(0x7f0000001100)=""/4096) lseek(r9, 0x1, 0x2) sendfile(r7, r8, 0x0, 0xfffffffffffffffc) sendfile(r7, r8, &(0x7f0000000040), 0x8000fffffffe) mkdirat(r5, &(0x7f0000000340)='./bus/file0\x00', 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00@\x00\xdd\xa8>\xbc\x89\x01(4\xbdfx\xb6tQ-n\xde\xd0 \xba.Qf\x97E\xa9\x85\xba\x884L\x18\xf4\xa1\xeao\x16\xae\x85Qx)\x15%\x12\xa9\xeb') openat$cgroup_ro(r6, &(0x7f0000000140)='cpuacct.usage\x8f\xb1\xa3{\xcf', 0x0, 0x0) setrlimit(0x8, &(0x7f0000001240)={0x1, 0x4}) 15:00:11 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = creat(&(0x7f0000000740)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r4) sendmsg$IPVS_CMD_NEW_DAEMON(r3, 0x0, 0x4000) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @initdev}, &(0x7f0000000140)=0xc) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r5, 0x2081fc) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000300)=0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x74) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)=0xfffffffffffffdff) socket$inet6_tcp(0xa, 0x1, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000240)=0xc) write$cgroup_pid(r3, &(0x7f00000002c0)=r6, 0x12) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r7, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) close(r1) 15:00:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x380, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000100)={0x4, 0x8e, &(0x7f0000000240)="7d3f60305fec749614e2f1aebf8d30e0389ae93e9e56cb853fecb7e0fcd66b9d531ee26c52650bc6a5342bcfb23761994392a3d198a00f79ad4be500648292b88845e39bd34d3884292fb84e2d1bd48db2c5b99d8b8f79f065b6148accd6dcda0c751ed8b2f8f7f14f6fa2b4a451a6cbc6630f05d2024c9f187dd589e4de1632b38c2a22cbf56d3f1a7c95c98035"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x24000, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x0, 0x1, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @ipv4={[], [], @empty}}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r3) keyctl$get_security(0x11, r3, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) inotify_init1(0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x80) r5 = accept4(r4, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) setsockopt$inet_buf(r5, 0x0, 0x28, &(0x7f0000000300)="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", 0x1000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x80000, 0x0) 15:00:11 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:11 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b77091", 0x93) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:11 executing program 0: mknod(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000540)={&(0x7f0000001840)=ANY=[@ANYBLOB="3c01007b3365d9abdfea5a8fac9fdf72ab2f42ba01743959604c8504f538e8b51b1879989891cf9ee4929079dc610d6d9361b8d05c94aaa833119d9e1e0ed2e4ed1a3d00098dc313edb2dedf015ffaf15704c19d2e371b3855b35b1630562cc876a75067cbdf50be71c96883004735db07cc6af7d694000000000000", @ANYRES16=r2, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x4010}, 0xe534b7f00548a2e1) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0x1ac, r2, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3608062c}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe1a3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xbe}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff80000}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2c}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}]}]}, 0x1ac}}, 0x80000) mknod(&(0x7f00000000c0)='./file0\x00', 0x8001420, 0x0) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x2, 0x0) write$FUSE_LSEEK(r3, &(0x7f0000000000)={0x17}, 0x56) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r5, &(0x7f0000000400)={0xf9}, 0xffffffffffffff63) splice(r4, 0x0, r5, 0x0, 0x3, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x3, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 15:00:11 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:11 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:11 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'\x00', 0x10}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) close(r1) socket(0x1, 0x4, 0x3f) 15:00:11 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f000042d000)=@routing={0x0, 0x2, 0x2, 0x80000001, 0x0, [@mcast1]}, 0x18) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @rand_addr="a11a7485e49671841b5e68e43426b27b"}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@dstopts, 0x8) sendto$inet6(r0, &(0x7f0000000040)="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", 0x58d, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="0e0004000400000000201500def6d4dc0a5e670b40c53c0d8214eab02bcb53c1e0"], 0x21) 15:00:11 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = creat(&(0x7f0000000740)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r4) sendmsg$IPVS_CMD_NEW_DAEMON(r3, 0x0, 0x4000) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @initdev}, &(0x7f0000000140)=0xc) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r5, 0x2081fc) ioctl$PPPIOCCONNECT(r5, 0x4004743a, &(0x7f0000000300)=0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x74) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)=0xfffffffffffffdff) socket$inet6_tcp(0xa, 0x1, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000240)=0xc) write$cgroup_pid(r3, &(0x7f00000002c0)=r6, 0x12) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r7, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) close(r1) 15:00:12 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:12 executing program 1: lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r0 = geteuid() quotactl(0x6, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)="f8fdc88304fca8d47dd26e75ab90b4bf3b785f002a4c5a30836ba7ce0836768679") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000015c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001640)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000001700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x15021019}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x28, r2, 0x200, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r3 = openat$cgroup_ro(r1, &(0x7f0000001740)='memory.current\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f00000018c0)={'broute\x00', 0x0, 0x4, 0xc5, [], 0x1, &(0x7f0000001780)=[{}], &(0x7f00000017c0)=""/197}, &(0x7f0000001940)=0x50) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000001980)='/dev/keychord\x00', 0x80000, 0x0) ioctl$PPPIOCDISCONN(r4, 0x7439) lsetxattr$security_selinux(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)='security.selinux\x00', &(0x7f0000001a40)='system_u:object_r:system_dbusd_var_lib_t:s0\x00', 0x2c, 0x1) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001a80)='/selinux/status\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001b00)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000001d40)={&(0x7f0000001ac0)={0x10, 0x0, 0x0, 0x200040}, 0xc, &(0x7f0000001d00)={&(0x7f0000001b40)={0x1ac, r6, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xad}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd50b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xec3}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x30}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x34d7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}]}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x2000a040}, 0x40001) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) pipe(&(0x7f0000001e40)={0xffffffffffffffff}) ioctl$EVIOCGSND(r7, 0x8040451a, &(0x7f0000001e80)=""/4096) r8 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000002e80)='/proc/self\x00', 0xc0000, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000000, 0x13, r8, 0x0) pwrite64(r4, &(0x7f0000002ec0)="91e58756c0b19e33e5a570f5c93a71b635f3d3c4db38fb245d01b3bdc73a94630315be0aa30bbb5a669c751479713c8380d54b43ee1239d0492f0a00ef48886b9463da9be3a45c66d18463fdda690a956895c778d8f2caac28b5bc87f605b46d78a22eeadcbc25715420f10b2c7f77fdf01d0bc77d21cbb8d7b2c7156467057a468f2bac6b80c7a486fb23884148d7968f305f473161b58a074dedc19de61503ca1b50aca91f014032f8ebcd9f2162c81ec4ead79edd314651c96469a54fc96cd08a0b9ed8c3bdf80b3bfe7b217eb34e6bd48f561d634023c9283b5ca14c8f0b5a09214e9c3f47e1682797e2d8cbf851e7b637f668a47680d26e0141d4de428b4b82ba965b51604835a9297805b690e1835c86646f6dee074edfb2533c869e8b73cde2e022c959ca1a46ef46af380c54ac487796e9a45e498a71394d6c43bb375c266c0b7c47c73d276feb6e60d7cb7d6a96be4ac929cf4a7472f6d7badc0a41e9fc0dbb848afb175403a1e83f91783e38c2bd25161347aaa976de1e46f25188e42329b3f3dd682553766855af1826381e9bd15679c38aac37afa30ebc80ebd4c9fa09ddca9f7afa9c277140082003a0f1a62c82da838acdacfc4ba9c4594e38b6277c90528dcfd46c15637b97739682fbd44c0e601471de18955f5bd55ec0f9286cee970d9a03c9ba510415a60faf0a7431aa2575f81a6b73268c42bde40503ea202ae809875eccd0f7dd3f5415bce5226556a90587dc4b07d31edb797c9334f22252739dba9e971836e1f5ac09bd1f4135c4588af779343ec242298e17c6ae05eceb8c5dbf8614b9322730eb29f76efd2c29b0547353a74554bd02d38fba5c62f1ec7ffb675db4efe568bf112b934035bdc0e9f380ae591807c06922d4f57b53f6cd6131d26dae471f8b578f8276d25e306718c52cadb2555e76579d3783bb9bf837b4fbd5295c309bac7e78c716546a9072e2d0954ca3b059ae6845bd8d7b431f91083efff5deee9d0778293c563e56c2effab11e46a786332bc7e39deddc112780b78f28b9f7da3c1da1a4acf44f2988b320f9c2240a16a712a2fcbb137926c4dd544576384c635ef32b6420ac23c8d4f7c9c53aceaf963561828e1d818d6f2d032e6dc380e887054e3f592ccbfe08817870d7ddde67bf549382423c15182962846098d1d8e15cd6a51af58768ae643ce25430d4405883bb74fb0f2db543f0b8c28402b5bc88516ecdc3b963703db8e8565cedea6fab94a138a446b0b7060e179de3b24d4ac9a0084e6fa12f28a1c4cb8cb6068f1cf71f816cf79a4abad2f8ca3ce45f8d69d52240ccd72e68b4ee515a4200ddca1f9ecf2772675a83090051784cf76ccbaca0a65242eef9befbc53d0145a71b85aa9f55ccbb4d6a7ac53b618075e2d71a44991dee88dbe00ad50b78e27dfa7a19d5f0a77e4ada219080bd4a32667ebf73bdc13288e81bc2005c04205346b7d7cf44e448af07b884b358624b44644a56950e3ac5f9b0f8f6259f7d61bc3c6443dea2987de761239d1a25f36bf718860adaa698b8c4693992f1478949d388f958b23c4c07e81962fefa8b52ce8f24ecdb8fa0104f60fbc811cb12d7a84761c70cdf01c35c6f4a46404c9862600a5cf3168b8188e27597e4ad04d0f83cd27027db2b81898be232dc8768dd2d8db057ea768ca4d52a46b2572092b9b8ff217b9058b334ae2adf43a067e9c417df3eda3e683a7f0f8337e78493eec33ebd126140771b25c5a867bb65c2ee394fbc0b63767a8934f2bee0234bd0e14c236bc9983b0e85cc99f89446261363c57103b09678cfa376058c53fcc2a137e4eb4ebd1536130c176d1ae0f02ed8507b9f24b15b84b7cdae3282502731f5dbf1af243a3f16689d3c956ef1c19396e302b0a5e273cb8dfcd67cd49a8805d0916a4e7b1e1711482ee5bd40cb6666f5a56b6d4d2727cd6f91ffa0aafa137e82aa1e5327c658ea26a93f3645b1e38ae692598205ac75cf8a8cc788c9aaaea3730b4ba0e4d97a33d1f4f241dc75f8d921c21cf95bc03309f9b40ddd6030fd2764ef16426a700488beb6e427919f42c185d5d6a970c1a67d45143c861cf8a3fc04d7277dff369bc728d8e613b1bcdb2e344af4d1565bf5148dc2e4c5cdf6d75c94ea90fe1a49c16906968153732bd7be968ab444eda7adf7c8775beedac46b748fc85117cb46b17443ef41452dffba5745aa3735639ab48102c0acbebf5dceeaecd315b9a16a59770a626c03fe3e9d92abba16532f991c1730ac375a83f7cca19d6bee7a9323dceee462ed7dfb1f75aa95504eb481e29cd78506ef174528e6286651aa8bc094deff9cb475484fb2b39831db0d69978c10af7f35e4042ff5a9d9af8610ba3f4110b8ad2c2544702ace4bbd98feb697fd5f850d788dab0546ae8bcb684c65cde4ba8cbc350014c57993fb22ef42e5d18e5ce0175fc634888c68538d98ad7ff0d289b35d47d798f5663ee3489c3a87885c2ab252aa60c88948a18932044331a4c782d0400e4b70a800d35ec572181daf723437f5ab6cac9a2583f8514f43b366683805aafd2685ce1d65d25d53df3156a5841aafc2fec57c14834e4509e9f547c4da2c9d278655257ac290d92522d2c404e0d3013e542be422896e73f8de821cc7d52a9cfd462feec91ee00463ddf22b2a9cab925b6779d1f7e216e17a3c9c719618b0e39d730af73656be78e2f1ce3d1c1996cc4be6f79877e3a873228b32a3d7a2794cbcca53f6f08940bcb137b69db20c9db584a9f9dff9309fdc28e77ad5af0fa8b3f235cd766baca33036d59a8cf5b22a1dbbd6aa0fd9f716a641426aab2979828a56950ce56b164ee6e61bb22b66a1134024d0a143a30ab2ee943c1f60038ffba745eb3c3d8122c24b4efe9ff2d8d07b844decaba1a528374edcb4828db3faf3eedad3fd4bdce608ce27f9b3740de67e19e683427d721969aa85d1df67f26dadf295d5b0815742b89839db3f503dd867ee81ed544bfcd7577b69243d1b866de76a8292c756bce120f9273ccc29c9bf9da2f8ec20f45a3eada8567aa938dc9edf9bd4a094788c4e28c119af9f3726181a718f5b3367c52042928e9b9238979323f8394ee535360a8f628a75bbccc0eed32683164e4bc39127acab2ccad979a1f100a202a41854a3c5f02bdc695c728695aea20a7bf55c9413f5dac1962e6bf44fde9204265dc27229f2b4aadaf6bcd9f8b86f5bc4028f44c5d4f7a15af43c1f4f40656940cb12eec84bed4ad41cbf889d7334f0f082ec0ded2a98b4cb83ac658db18561b12535a14a2691c18510e9941152b50e5b89b33073a07ba6ea85fdc043c5f17e78a9bc566205e50c593b91a4bf57535e5ef922e074bddc6b8007d20e19763af296541e5b9dc99387d3af50be6293d62f2cecd9b4326f3cdba33561ce6a9ac87dbb3d592c9c018887d14ebdf74ea19a991ca9fcda9331aa0ef7631152b541f7e580ae2a56f968b5616096196a94624d643208bfa47d87410c9283a1ea8bd06cb2041869a3968a899d57f47525334c671bd39cfb6b853f2cc84eff7522693222ad01b14c1b0df5e6a9ffb24702c19ac58a9c9d416ae64c7de64eb1983525b583c351b58bcf01770cad3e0d01dad4d3ea5f483afcb1cbf032681f832b673c90a802675c2f8f3d24003241c036d682488830708b1d4b478b69fb6daf896c1f68e7c1f4c6a0021759bc2ed251261100689592c11bb46e45f642056d5dcb8c4b0542909be01be52cc3bb7c5d58d84e936662e6933b7c55aa797e151487aa43ac3d66d37b09d3e2835a69f04fb11bdfe8501d0bfb2d57c2d721d267efc3bc6ae9e4764a1b74ebb573cd0cea5e353c7940362f4b307d8681d1638cf27de60401d417f514baefe9df9ea5c40d365b423e8c83bd8da75e56164bed0532d6349354c107edfc9460ea232d9fefcbff74178f94f98d5514c7d28ead9c9079e196466bfbfbe8abc0d2a7d0cd70c238b30f9f6b5ca9cbd20e1447b27baca3d686b8aef2da76d58f789dddc1a1f7cd9bc59109c016df9a24f8c4f0428518e69661adb585b4154cae8d32fd463dfb3643f1298982258ec4acc3830b66d70efb16230e70765266d1d65ed30a7db9334016212ce5680080f6321387ed090fc47886ff09bd650018c7140bc8ddc67c3b3a0426fe1bbb96614cc15d2f3a4682fe0053754d715fa5d9cf96b5b783b9c8bd2d2ca380677cc13d42d5433e55607250388cf2314356ef7a29c5a04ed8234b64ea60a2cda46794ab46220194a31c4fdb806742972aacd9550078ca008bf218d375d681932be1f55ba10aa6913a7e54d7ade72f10c6ccd18cde0e033f1dccf762fdf010fb00dbce485f1bb47f7725570e7d54bc54f92a3cc85cd0ea78b7de3d054afbcbfcdde13f4292a92b73096301cdbf1b9b3bb473f2388c9bd544dffe386bc2e549a8af761f7aa0e94cce9de492bbe285f5895fae38a95115624f530ddde3bc392324e945493dc519105a85d66dec9c609a4d9421f8a9835d8e42172b2d0ff7ba4736df40ae8848389f28142552e536a8b3b06b3a247d224088fe3151a03f2dd2a49c5f72c73a6c91b26926c9b00ac29b896f0db38103cdddb65f2382242dcc96e5ca80d6bc5260bc011ca4839cc97affe84c1150a4fa7ec22cd4762676b8cbd0195e7713fdf760fba622c36314ea3b649a3dfe15c56ca5bd7e9146ae4b61c20c1c6c8a070300d70e8b8ac0ee2f84557ad714fcd5f2c45c1a0a9e5f15cb1b1cb3b0fe9386adf955032f408f03cb4237202f5f509ee92c3f270915963602f198be8fb3ca486c808da162a8d38d9ac8e5a47b9014ab71082560bbf39f6b5454f4959495f5bb58047b5f2aa901cfb981ba43f1d117c3bc1fcc3db7ed1c26cd3b8862f2a40eaa0092cd7c227f859c4313a65868fcbb9455fb37d66b9d6f5221892928d13d3391c9e82ae6c4946409609b5550e11512b1d89810ca65bde6dffcf121e4c76ed80e347736e065a36832479db4cc9fa22f80ef84666c85dee321bed7cda0fe0308a7b2f0bcdbf1671bf925770c401d8bbd1ceccd8d15b32adc8c204217dfe502b9bf520842e9fbd4f2b8fe84eeb43e5fc279812cc6785d64ad0c5319e4f8477b7b908039e65eaeaebaaff04c835e4adaab6ddbae722004bb33a7d74019b8b45a4046fa8b37e5b94494ea0db0d8c8cf567f9bd44b8e91e07f74caf097b9f59f7c6be3f3d124d9e03319f679d2a9b0ea8ec03284b4d465d8e2873fd4037c863fcfb356064fc9f7b0c0511ef38d56249da61700e38c2ea2c0027dbd0806f8f0011873da0ff5e483a50982020e030f1fb231eb6b3a1afe8c3518a142ed1cd57875ca5b5cef9eb22025ea9354cc9851bb315c90d0b7b8d5c5237dce96423e58fb027fe3de0937bc06959a043607f57f81516a3e2d24d53144da22b8bb38534ab1dd7dfd8557595f407ed9f38c96e3dda04ef3b63bc320e5f8481f5617e6ca1bd37ebe367ecbe2e9c79402e74ad5cd19cc4458cc1f8bfffb133224d53168bc1d9cbdc2eea9653baa1842c81e479212a5b4f6b37006b39f48b677fff2e04cd0bcf5345a5d839bac591a1ca16ea34e461191099c525ea750eb2e773f49e512968559af7e156e2cd9b704a667e653810b24abe58f6d9c834577d20d47f6530f8c4ce5d767ee8481712d914a948f1786eeaa748015c3e4e33456a0764474d7570299a4b5a7ec436fb57a293636e75bc3a760c64a8c8e187cbbdb690e4211618f55fa435f3f0791638434f744a81a12aae997c0f7bd1439d9400e28a304ed25c0301d51be", 0x1000, 0x3d) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) r9 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000003ec0)='/selinux/checkreqprot\x00', 0x200001, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x21d) r10 = open(&(0x7f0000003f00)='./file0\x00', 0x50000, 0x40) utimensat(r10, &(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003fc0)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r11, 0x6, 0x23, &(0x7f0000004000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000004040)=0x10) r12 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_GETXATTR(r12, &(0x7f00000040c0)={0x18, 0x391e0bdee66a2842, 0x1, {0xffffffff}}, 0x18) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000043c0)='pids.events\x00', 0x0, 0x0) sendto(r13, &(0x7f0000004400)="0e36d3903beea9", 0x7, 0x0, &(0x7f0000004440)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x1, 0x4}}, 0x80) 15:00:12 executing program 0: socket(0x10, 0x80002, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0xc4800) ioctl$KIOCSOUND(r0, 0x4b2f, 0x7ff) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 15:00:12 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d", 0xac) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000940)='./bus\x00', 0x141042, 0x8) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x27) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r3}) bind(r1, &(0x7f0000000200)=@can={0x1d, r3}, 0x80) r4 = gettid() r5 = dup(r0) getsockopt$IPT_SO_GET_ENTRIES(r5, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=0x11d) ptrace$setopts(0x4206, r4, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') ioctl$TCSETS(r5, 0x5402, &(0x7f0000000040)={0x8, 0x20, 0x6, 0x2, 0xc, 0x0, 0xf9, 0x0, 0x2, 0x20, 0x3, 0x81}) tkill(r4, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 15:00:12 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) memfd_create(&(0x7f0000000340)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000002c0)={0x0, @multicast2, 0x4e24, 0x0, 'rr\x00', 0x10, 0x0, 0x76}, 0x2c) r1 = fcntl$getown(0xffffffffffffffff, 0x9) epoll_create1(0x80000) r2 = syz_open_procfs(r1, &(0x7f0000000180)='fd/4\x00') ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000480)='./bus\x00') write(r4, &(0x7f00000001c0), 0xffffffe0) read(r3, &(0x7f0000000200)=""/250, 0xfffffffffffffef6) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000003c0), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) getsockname(r3, 0x0, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0xa) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200005) sendfile(r5, r6, 0x0, 0x8000ffffffff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x1}) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0xec38ed91f9c7494a}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r8 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r8, 0x80084503, &(0x7f0000001100)=""/4096) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r9) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) fchown(r8, r9, r10) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) finit_module(r2, &(0x7f0000000440)='\xea\xd1\x1f\x9d\xfb\xa4\xa3\xcf\x03x\x85\xa1/\x90\xe3lan0\x00', 0x3) 15:00:12 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:12 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r0, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) splice(0xffffffffffffffff, &(0x7f0000000400), r1, &(0x7f0000000440), 0x0, 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r1) r4 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000004c0)={@ipv4={[], [], @loopback}, 0x71}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000240)={0xf736, 0x7f, 0x7, 0x7, 0x11, 0x3, 0xc0000000000000, 0x7fff00000000, 0x3}) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') fsync(r4) write$P9_RSTATu(r4, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x3, 0x80000001, {0x56, 0x2, 0xfffffffffffffc00, {0xf6, 0x2a}, {0x4, 0x5}, @period={0x58, 0x100, 0x3f, 0x9, 0x7ff, {0x94bc, 0x2, 0x5, 0x1f}, 0x2, &(0x7f0000000480)=[0x0, 0x0]}}, {0x53, 0x100000001, 0x6, {0xa22}, {0x6c8, 0x401}, @ramp={0xf38, 0x3, {0x80}}}}) r5 = socket$key(0xf, 0x3, 0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0x6, &(0x7f0000000100)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r7 = dup2(r6, r6) setsockopt$inet_int(r7, 0x0, 0x32, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/357], &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x0, &(0x7f00000001c0)) write$binfmt_script(r4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x13b) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, r5, 0x0) 15:00:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x104) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/context\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$cgroup_int(r3, &(0x7f0000000080)=0x80, 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r5, 0x0, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x802, 0x0) sendfile(r5, r6, 0x0, 0xfffffffffffffff9) sendfile(r5, r6, &(0x7f0000000040), 0x8000fffffffe) mkdirat(r3, &(0x7f00000001c0)='./file1\x00', 0x180) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00@\x00\xdd\xa8>\xbc\x89\x01(4\xbdfx\xb6tQ-n\xde\xd0 \xba.Qf\x97E\xa9\x85\xba\x884L\x18\xf4\xa1\xeao\x16\xae\x85Qx)\x15%\x12\xa9\xeb') r8 = openat$cgroup_ro(r7, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) setrlimit(0x8, &(0x7f0000001240)={0x1, 0x4}) getuid() lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)) r9 = socket(0x11, 0x800, 0x7) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000640)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) r10 = creat(&(0x7f0000000100)='./file1\x00', 0x2) ftruncate(r10, 0x2081fc) r11 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r12 = open(&(0x7f0000000580)='./file0\x00', 0x141042, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r12, 0xc028660f, &(0x7f0000000200)={0x0, r11}) r13 = open(0x0, 0x141042, 0x0) write$FUSE_WRITE(r13, &(0x7f0000000080)={0x18}, 0x18) mount$fuseblk(&(0x7f0000000380)='\x10dev/loop0\x00', &(0x7f00000007c0)='./file1\x00', &(0x7f0000000440)='fu\x06\x00\x00\x00k\x00', 0x400035, &(0x7f0000000840)=ANY=[]) preadv(r8, 0x0, 0x0, 0x2000107c) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 15:00:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4b579a335563a785, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = dup3(r0, r2, 0x0) r4 = socket$inet6(0xa, 0xa, 0x87) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r5, 0x1, 0xf, &(0x7f0000000040)=0x4, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000000c0)) listen(r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e22, 0x1, @empty, 0xffff7fff}, 0x1c) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x4, 0x4) listen(0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f00000002c0)=@gcm_128={{}, "0582b3b2cd6253d2", "3c3d20bab35bfbc7d50563a5928015b8", '[(RF', "9fd7d095901dc729"}, 0x28) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r7, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e21, 0xfffffffb, @mcast1, 0x80000000}, {0xa, 0x4e21, 0x1, @rand_addr="be54415719ccba12dec641426f954dbe", 0x805}, 0x56af, [0x3, 0x6, 0x653, 0x1, 0x9a75, 0x0, 0xfffffff7, 0x4003]}, 0xdd) r8 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r8, 0x80084503, &(0x7f0000001100)=""/4096) r9 = dup2(r2, r8) setsockopt$inet6_int(r9, 0x29, 0x43, &(0x7f0000000100)=0x81, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 15:00:13 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d", 0xac) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:13 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x2cf}], 0x100001b9, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r0, r1, 0x0, 0x20000102000004) preadv(r1, &(0x7f0000000000), 0x0, 0x0) 15:00:13 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:13 executing program 3: pipe(0x0) read(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) creat(0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0xfffffffffffffffc) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x81) sendfile(r1, r2, &(0x7f0000000040), 0x8000fffffffe) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r3 = creat(&(0x7f0000000740)='./bus\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r3, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r3) write$P9_RSTATu(r3, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r4], 0x17) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000cc0)=ANY=[@ANYRES16=r4, @ANYRES16=r5, @ANYBLOB="000126bd7000fcdbdf25090000001c000200080009bf9da0fd00080002004e210000080005003f000000080004000004000008000500b5bc0000151b5d02ab042d934089560620f1b0e95c961bff062f8df0ee21e44263a5f97a13b69b171badb77f91dc9162ee8870275d69b161948152cb1d9633bb0ebbc0d80000000000000c172e44b87032ec6baea8a17746ca2c96e51e48a8cde4c2cb76a26e1ff1742942cafd486aacf752b126208539a9cf0f15e77a8b444c247aab1108fdc20aefdcc8ce1cae5c554dcff94deb57ad2b452eda2aa211470a000f6e7b58cf333ae12ff4cbe4196c2996ba024d118c94a7bc993d2b5d18c2851f6b6ba25d1f2b5029cadc2d302cb4f7c40db287b64ee506ce55373add6b2c126e3009071c60f8ed2e4b5a19e0b1e29b68dd21b74cdd714cc22b2e69eb7cd4ef99eab875a0be85ecf61b1c807f93f6fbedd812f45c71af9c098c6b2c057f7dcd689aa7297ee02798d8d80131cb00000000000000000000005560abac0cdaf2a48fba118bff228c41f0086f242b2e903c76ae4d46c2713d69f80425eb5f14394ce00ef8d3ecdd9dcb00bf32a429f31033a227221fbd25"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x4000) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) ftruncate(r6, 0x208200) r7 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000200), 0x2a5) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, "ba51e2a07b47d8c29792400b07fcf7186ecd9a9b457dcbcf29a0b5a151caaef6bf2e2b9fc81601d8d2e412b1ba5c75c27ba2762e0481023ac0a68f145d4ded5f", "0ddf1561e089d72e4243dd5d6c63c76b3607ff73bb7615f500004000"}) sendfile(0xffffffffffffffff, r7, &(0x7f0000d83ff8), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) fsetxattr$security_capability(r7, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000540)=@v3={0x3000000, [{0x10001, 0xff}, {0x3, 0xdd7f}], r8}, 0xffffffffffffff79, 0x2) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=@updsa={0x1d0, 0x1a, 0x200, 0x70bd27, 0x0, {{@in=@broadcast, @in=@loopback, 0x4e23, 0x1, 0x4e20, 0x9, 0xa, 0x140, 0x20, 0x2f, r4, r8}, {@in=@remote, 0x4d5, 0x33}, @in=@rand_addr=0x8001, {0x20, 0x9, 0xffffffffffff565b, 0x0, 0x5c3935ad, 0x400, 0x4, 0x100000000}, {0x528, 0x80, 0x8, 0x3}, {0x3, 0x2, 0x7fffffff}, 0x70bd2d, 0x3502, 0x774ca41a737b082e, 0x707ab60b227cf728, 0x3f}, [@algo_aead={0x7c, 0x12, {{'rfc4106(gcm-aes-ce)\x00'}, 0x178, 0x60, "7279dd884ab4663a7555af4d0e5d148c1b35614c0cf12586fb2dfe13742bbb0b1bd3d53f9745d84b460ee4cc87c5b7"}}, @user_kmaddress={0x2c, 0x13, {@in6=@empty, @in=@loopback, 0x0, 0x6}}, @address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@loopback, 0x0, 0x3}}, @replay_val={0x10, 0xa, {0x70bd2a, 0x70bd26, 0x35}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x80000}, 0x4000011) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@local, 0x55}) fstat(r0, &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f0000000500)) getgroups(0xbe, 0x0) socket(0x0, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, 0x0) syz_open_dev$loop(0x0, 0x7, 0x0) 15:00:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xc51, 0x0, 0x6, 0xfffd, 0x2}) ioctl$RTC_WIE_OFF(r2, 0x7010) writev(r1, &(0x7f0000000200), 0x0) 15:00:14 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = memfd_create(&(0x7f0000000140)='\x00\x00&\x03Gd\xe4\xe0\\\x18D<\xb8\x00\x00\xb9\x9c;(K\xfe\'F\x02\xe9wP\xb2a\xe9)m\xb7>\xb7J\xfcR\xc3>\xc7=4A\x9e\xa0>\xa4G\xfb2IgD[~\xf7E\x84\xa2R\xc7\x90\xae\xf0\xf4\x9c\x8bf\xd3\a5\x83\xa3\xea&\x01J\x01U\xde2v\xc2\xdc', 0x1) io_setup(0x7f, &(0x7f0000000080)=0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r3, r4, 0x0, 0x20000102000004) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) r6 = open(&(0x7f0000000940)='./bus\x00', 0x141042, 0x8) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x27) r7 = openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f00000001c0), 0xfffffef3) r9 = openat$urandom(0xffffffffffffff9c, &(0x7f0000001440)='/dev/urandom\x00', 0x2000, 0x0) r10 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r10, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r10, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r10, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r10, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r11 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r12 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r12, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r11, r12, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r11, 0x4c01) r13 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r13, 0x80084503, &(0x7f0000001100)=""/4096) r14 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r14, 0x2081fc) r15 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r15, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r15, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) r16 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r16, 0x2081fc) io_submit(r2, 0x8, &(0x7f0000002840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x9, r4, &(0x7f0000000240)="4ab7a61dd088620952ad2571b7a94fd734737eec7768bac19271cd9ef05e2c1e68b78bddaf945bcd0a2fc7fef9cad991fa87f0679319dd3527fa16fed8c981f44103e277f129921136b93159f70520dee99db0b5166e683e6500fc091a8452cf8277f44938a26e393333ddc31e7b5fdc5be8216f80d75ae2ba6a8bed86fa47e34a406ede607e0f5df604e3717db7cd79cc1afe1b3269a0f63194d40b155044110b19af2cb6455e99bb8f5612979629", 0xaf, 0x7, 0x0, 0x0, r5}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0xfffc, r1, &(0x7f0000000340)="efee08394696f279add3265a7b36ecba038783e0c125918fdf01a4692e3bfbcfb3d3a55e47e76f79f75bde7da239423be7f4e82d24d7ee8f3ba0351462d86fc94390ead2fd1568558a7e36d5f5e691c6895fe93c56a0e3cdab9fdb7f0bbe1f9afee3b50bfc243fe408f61f451dac0045c7ce144f6535ef5bb42a", 0x7a, 0x4be, 0x0, 0x0, r6}, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x7, 0x2, r7, &(0x7f0000000400)="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", 0x1000, 0x1000, 0x0, 0x0, r8}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x9, r9, &(0x7f0000001480)="68f56030be4185aaad27066487ba753579ee00176089e0cf7396e78547aefc640147ca7ee92b2f3878d8e6e587121ac2184d411a163024533785dff5e1389bd02a7371a7fbf6b7924924bb72e48152fb66d58a8bd536e9800286e194086859c448802c67ce99f9ec4f7e07f4b269b46fbc875d70ba21efd182e3f5d70039c37db473bab35574cafefbc1d8f614996048bfe760e7da17629541b41b67695e4b6314858bf7975f46acc0da42d7bcd8d23b8a328a00591d5c25c0fdb2f5e85b677ac49da54811792bb576ea995f5c3141922e80a1", 0xd3, 0x7ff, 0x0, 0x0, r10}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x7, 0x1, r11, &(0x7f00000015c0)="361e78402829aa1cb4b21a7fd77ac76f997053c05ec17b", 0x17, 0xaa, 0x0, 0x2}, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x5, 0x81, r13, &(0x7f0000001640)="7955d8fa31ca2ce0dd51c37e3e0985bb48324b62e75f2c97a13c35be0b37986e67de6a126e7c26929a3ed5cf2286589073913675897a41d303ccb2dc5422373454aef6d579e13799a8a4142e4905ce436d4df846920bc3dfc39c745ac72c2693c2a75a2cd744f7c65ca81d1e13e90a37ca1d83f596238272686849ae600e26774463a7e5ec914f6c29aac62283c24d3aca45c5c001245132296d451bbbaa8b890d911fe1b62ac6ae11fe90f2908841dd04a4a2c28d1d8a1b40eeb67958c31a19dd1498f69977686f2609b8722be6dfe1fd", 0xd1, 0x8, 0x0, 0x8527550e7f3e9a6c, r14}, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x3, 0x5, r1, &(0x7f0000001780)="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", 0x1000, 0x4, 0x0, 0x1, r15}, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x3, 0x3, r1, &(0x7f00000027c0)="186aed6203f3e00330ffe208e34fe0ab324db21e932d0732a707d01cae8748532fad7d1e7d61a6de12ea9377faef2166b3fe476b14ddffde8f9bfa", 0x3b, 0x3, 0x0, 0x3, r16}]) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='#!'], 0x2) clone(0x2102201ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r17, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) ioctl$RNDGETENTCNT(r17, 0x80045200, &(0x7f0000000040)) 15:00:14 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) sendto$inet(r2, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0x27c}], 0x1, &(0x7f0000003780)=""/232, 0x1fb}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r3+30000000}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000800)={{0x0, @dev={0xac, 0x14, 0x14, 0x21}, 0x0, 0x0, 'wrr\x00'}, {@dev, 0x0, 0x1, 0xfffffffe, 0xfffffffc}}, 0x44) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1, 0x88000) syz_genetlink_get_family_id$tipc2(0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) r4 = socket(0x10, 0x2, 0xc) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/536]) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) 15:00:14 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d", 0xac) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu\x00_\x95OC\x1e\xa0 _\xc7P\xe7J[_ ,F\x14q@\xfc_\x05\xc5`5\v\xa7bq2\x9c\"63\xb4\x9cL\xac\xc6\xdb\xb4\x88 v\x06\x1d#\xb2O\xdd\xb2\r\x9d\xe2\xa3\xac\x10\x11H\x85{\xd5\x16Uo\xc7\xef\xc5O\xbc\xac\x1e\xf3Bf~\"\xe0\x9a=`K{sz\xa2\xc6\xd7\x7fM\xc2\x90\x9f\xc7\xb6#\x034!]\xb6,RgC\xef\x17\x87\x99\xe6/\xc9\xf1\x8e\xf8\x8e:\x88[\xda\x00\x00\x00\x00\x00\x00\xcc\xc8haz\x13p\xf5\xf8\xa5\x82\xfc\xd2\x99\xe4\xd3\x830\xff \x87i\xfb\x88\xc7p\"\x1fH\xd9V8\xcb\xbcK\x1a\x9c\x97\x06\x10\xfe)\xdfw\xdfy\x99m~\x163X\xbe\xf4KL\xac\x03|\x04\x94\x05q\x15\xb1\xb6\x0f\xc0\xd4\x11\xfc\x91\t\xc5\x98I\x90X\v\t}z\xcfP\xf1\xc6\x9cs=A\x1dM\vuY\xd8n\x01A\xb0\xb7uHXw_\xdc\xd3%Z\x8d\xe4\xf4\x92\x8b\xfd#\x86:\xde@\x7f\xe9c\x06\x0e\xbf\xed\x05\xabr3\xa2c\xedy\xd6_\xcd\x91_Mj\xcan\x02\x1f\x87\xc7\xe5\xfb\t6u\xcaj\xb5\xbf9T!\x80\xfe\x85[\xec\xb5\xe6(\xc4O\xba\xb4\xe3\xd7\xd2\x03\xed\x9ft\xf8@\x87\x15\xdd{\xfb^x\x8cw\xe1\x05\x86\xc9~z\xd0\x14#\xc2H\x97\"\xd8\xe5\xe3\xcb\xa5\x04ma\x97\xb5\x009;\xf4/@~\x05(\x88\xdeD\xa5\xce\xf4\xd5\x99\xbd\xae\vR\xfc\xaa\x15\xa6\xec_\x91.\xae\xb9\xcer\xe8\xc4\xec\xf6\x87\xf2\xb3_\x99y&\xfe\x14\x88!]\xe7\x184\x9dL\xc4\x801AuwG\xf2`\x1b\x91\xbc\x83\xc95\xc3\xde\x85\xf3\x88\x80\xe6\x04\xc6X\xc27\xe4\xcaw\xe1B\xfd\x1e\x9c\xc9\x8a\xdd\xbbg\x89|\xf2[\xbf\x7f\xef\xf9s-\x01qfa\xf3\x88\x92&\xdda\x9f\x12\x14\xea\x8a)\x12\xbb\b\x16\xd5uZ\a$\x04\xe2\x98\x8dw\xd2|\xe1\xbe\x9a\xae5jW\x84s\xcc\x9a\xba\x01\xac\x05\\\xa5\x14\x98p\xe6|\xc7\xa4\x18\xc1\x8a\x8a\xd5\xc6EU\xf8\"\x86\xb9\x9c\x8fa\xa3\xea~\xa9z\x9c\xf9\xb5N\xc1\xbd\xce\xaeh\xe8\r\x14\xc0\x0e\x8e\xf38\xe5\x8e\xef\x9a_\x80\xfe\xc0\xf1)R/\xd9\x97\xf4\xe5>m\x0e\"R\xb9\x851\x026\xc3\x84S-r7', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) syncfs(r1) ioprio_set$pid(0x1, 0x0, 0x800004000) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x2081ff) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x200) write$P9_RLINK(r2, &(0x7f0000000180)={0x7, 0x47, 0x1}, 0x7) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='bond0\x00', 0x360) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000140)=0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0xfffffffffffffffc, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='bond0\x00', 0x360) getsockopt$inet_pktinfo(r4, 0x0, 0x8, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000140)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) sendto$inet(r4, 0x0, 0x78, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r4, &(0x7f0000000240)="e5eebcbea2985eb94d334d8ee1043b62cf773650e62f9f74408ba78df79541a7d7f63cd534d59a57cedd692d7857e28b149999c2b3177790728fac236097a33ea2f145b2491db1a9ffc2da08f028002e94438d5362ab6d318f5e1373cf978655c347044252801980a594d9c5a2c63fce286ddd259578ee289e233526f423228e0782eda5a28f03f1116b198abc1d8c52e5ddaf5bffef81c0ce10bca7be", 0x14d, 0x4, 0x0, 0xfffffffffffffd20) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000400)) 15:00:14 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:14 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, 0x0) r0 = memfd_create(&(0x7f0000001940)='\x95\x06P[\xb10\x1e\xff^\xab\xc6D4z\xaay\xa2rQy\xea\xcc/\xb5\xd5$E\xc5\x01\x86\xa0\xfc\xb2mN\x83\xb9=,lL', 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r1) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x33) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000300)=0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000018c0)={'vcan0\x00', 0x100}) rt_tgsigqueueinfo(r5, r6, 0x0, &(0x7f0000000340)={0x18, 0x1f, 0x4}) r7 = creat(&(0x7f0000000400)='./file0\x00', 0x80) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) unlink(&(0x7f00000002c0)='./bus\x00') write$P9_RFLUSH(r7, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r7) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000700)={'bcsh0\x00', {0x2, 0x0, @local}}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r8, 0x1) sendmsg$nl_netfilter(r8, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000001b80)=ANY=[@ANYRESHEX=0x0], 0x11}}, 0x4000) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001900)='/proc/self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x40001) preadv(r4, &(0x7f0000001880)=[{&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/165, 0xa5}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000280)=""/2, 0x2}, {&(0x7f0000001740)=""/145, 0x91}, {&(0x7f0000001800)=""/50, 0x32}, {&(0x7f0000001840)=""/62, 0x3e}], 0x20000000000002cf, 0x5f) r9 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r10 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r9, r10, 0x0, 0x20000102000004) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/checkreqprot\x00', 0x200, 0x0) sendfile(0xffffffffffffffff, r11, &(0x7f0000001a40), 0x3ff) socket$inet_tcp(0x2, 0x1, 0x0) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$FUSE_INIT(r12, &(0x7f0000000000)={0x50}, 0x50) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r12, 0x0) getsockopt$sock_int(r12, 0x1, 0x3, &(0x7f0000000000), &(0x7f0000000140)=0x4) 15:00:15 executing program 0: syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x8005, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x8004}], 0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000), 0x0, &(0x7f0000000240)}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) fremovexattr(0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffc1d) r2 = socket$inet6(0xa, 0x2, 0x0) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) fstat(0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x2c, &(0x7f0000000040), 0x4) mount$fuseblk(&(0x7f0000000500)='/dev/loop0\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x55041aa0a524732a, 0x0) connect$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x7ff, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r4, 0x29, 0x44, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000540)=0x1e) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06055c8, &(0x7f00000003c0)={0xd, 0x4, {0x53, 0x10001, 0x0, {0x0, 0xbb}, {0x800, 0x10000}, @const={0x17, {0x0, 0x81}}}, {0x51, 0x0, 0x8fa, {0xfffffffffffffffd, 0x5}, {0x1ff, 0x5}, @period={0x5b, 0x2, 0x80000001, 0x5, 0x0, {0x7ff, 0x9}, 0x1, &(0x7f0000000300)=[0x80000001]}}}) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x3, @mcast1, 0xffff}, 0x1c) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f00000000c0)) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000140)="fffe6a37e2895711417291f129a81d392ab32463617e226a0b3538356060ce3495079fbee206b57523a2721051ae98d9a9280c26bb7e229ebd6ab500906d5482b5214761f261bc0c6cd8976d636119c14d6fc6f9179504575170640ce7902820e3f86bb42478ac9a64f487b9673a9af7477c126a5702557016", 0x79}, {&(0x7f0000000440)="798680ce17cc0b28b0212ad47ab24c5b1f78e097b7f381fe3c53fcc1164b7d4f698f7e67a6d858592d1a45ba21b6677200fa2f4956b620925146c8430136d1b98d713f29feb9d83d57c005122d09252d0dd928bb6ba4f802200c67341792389218f5823cb60e9b1fcae153ee869ee7a5ab3271d9d0e4d547465cb397806f00908f146c36", 0x84}], 0x2) prctl$PR_SET_PDEATHSIG(0x1, 0xfffffffffffffffc) [ 961.872190] audit: type=1400 audit(1571151615.309:52): avc: denied { shutdown } for pid=5180 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:00:15 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:15 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, 0x0) r0 = memfd_create(&(0x7f0000001940)='\x95\x06P[\xb10\x1e\xff^\xab\xc6D4z\xaay\xa2rQy\xea\xcc/\xb5\xd5$E\xc5\x01\x86\xa0\xfc\xb2mN\x83\xb9=,lL', 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r1) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x33) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000300)=0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000018c0)={'vcan0\x00', 0x100}) rt_tgsigqueueinfo(r5, r6, 0x0, &(0x7f0000000340)={0x18, 0x1f, 0x4}) r7 = creat(&(0x7f0000000400)='./file0\x00', 0x80) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) unlink(&(0x7f00000002c0)='./bus\x00') write$P9_RFLUSH(r7, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r7) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000700)={'bcsh0\x00', {0x2, 0x0, @local}}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r8, 0x1) sendmsg$nl_netfilter(r8, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000001b80)=ANY=[@ANYRESHEX=0x0], 0x11}}, 0x4000) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001900)='/proc/self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x40001) preadv(r4, &(0x7f0000001880)=[{&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/165, 0xa5}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000280)=""/2, 0x2}, {&(0x7f0000001740)=""/145, 0x91}, {&(0x7f0000001800)=""/50, 0x32}, {&(0x7f0000001840)=""/62, 0x3e}], 0x20000000000002cf, 0x5f) r9 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r10 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r9, r10, 0x0, 0x20000102000004) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/checkreqprot\x00', 0x200, 0x0) sendfile(0xffffffffffffffff, r11, &(0x7f0000001a40), 0x3ff) socket$inet_tcp(0x2, 0x1, 0x0) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$FUSE_INIT(r12, &(0x7f0000000000)={0x50}, 0x50) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r12, 0x0) getsockopt$sock_int(r12, 0x1, 0x3, &(0x7f0000000000), &(0x7f0000000140)=0x4) 15:00:15 executing program 4: socketpair$unix(0x1, 0x400000001, 0x0, 0x0) r0 = memfd_create(&(0x7f0000001940)='\x95\x06P[\xb10\x1e\xff^\xab\xc6D4z\xaay\xa2rQy\xea\xcc/\xb5\xd5$E\xc5\x01\x86\xa0\xfc\xb2mN\x83\xb9=,lL', 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r1) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x33) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000300)=0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000018c0)={'vcan0\x00', 0x100}) rt_tgsigqueueinfo(r5, r6, 0x0, &(0x7f0000000340)={0x18, 0x1f, 0x4}) r7 = creat(&(0x7f0000000400)='./file0\x00', 0x80) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) unlink(&(0x7f00000002c0)='./bus\x00') write$P9_RFLUSH(r7, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r7) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000700)={'bcsh0\x00', {0x2, 0x0, @local}}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) shutdown(r8, 0x1) sendmsg$nl_netfilter(r8, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000001b80)=ANY=[@ANYRESHEX=0x0], 0x11}}, 0x4000) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001900)='/proc/self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x40001) preadv(r4, &(0x7f0000001880)=[{&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/165, 0xa5}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000280)=""/2, 0x2}, {&(0x7f0000001740)=""/145, 0x91}, {&(0x7f0000001800)=""/50, 0x32}, {&(0x7f0000001840)=""/62, 0x3e}], 0x20000000000002cf, 0x5f) r9 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r10 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r9, r10, 0x0, 0x20000102000004) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/checkreqprot\x00', 0x200, 0x0) sendfile(0xffffffffffffffff, r11, &(0x7f0000001a40), 0x3ff) socket$inet_tcp(0x2, 0x1, 0x0) r12 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$FUSE_INIT(r12, &(0x7f0000000000)={0x50}, 0x50) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r12, 0x0) getsockopt$sock_int(r12, 0x1, 0x3, &(0x7f0000000000), &(0x7f0000000140)=0x4) 15:00:16 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e", 0xb8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:16 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:17 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x2) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./control\x00', 0x410) inotify_rm_watch(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000d19ff4)={0x84000001}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000140)={0x1, 0x8, 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0xfffe, @dev}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x1) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0xb6c, @ipv4={[], [], @multicast1}, 0xff}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) getdents64(r3, &(0x7f00000001c0)=""/248, 0xf8) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r4 = memfd_create(&(0x7f0000000000)='\x00', 0x0) r5 = dup(r4) socket(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r5, &(0x7f00000000c0)='\x00', &(0x7f0000000140), 0x0, 0x1000) 15:00:17 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e", 0xb8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:17 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:17 executing program 0: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self\x00', 0x20200, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r3 = dup2(r0, r1) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000080)=0x3) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000004) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@sha1={0x1, "e359b191982023e9fdec1c8877f8da48a594569f"}, 0x15, 0x1) 15:00:17 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, 0x0) ioctl(r1, 0x0, &(0x7f0000000300)) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f00000008c0)=""/250, 0xfa) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r3 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/create\x00', 0x2, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r4, 0x2081fc) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe8) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x2, 0x0) dup2(r6, r6) ioctl$TCSETS(r6, 0x40045431, &(0x7f00005befdc)) r7 = syz_open_pts(r6, 0x20201) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) fstat(r7, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r8, &(0x7f0000000380)={0xa0, 0x0, 0x8, {{0x3, 0x1, 0x20, 0x3, 0x1000, 0xffff, {0x4, 0xbb9, 0x829f, 0x2, 0x3, 0xffffffff, 0x7, 0x81, 0xff, 0x100000000, 0x0, r9, r10, 0xa2, 0x89}}, {0x0, 0x1}}}, 0xa0) mount$fuseblk(&(0x7f0000000300)='/dev/loop0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r10}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) r11 = creat(&(0x7f0000000080)='./file0/bus\x00', 0x6857b21ff1155d90) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$lock(r11, 0x7, &(0x7f0000027000)={0x1}) r12 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r12) r13 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000380)={{0x77359400}, {0x77359400}}, &(0x7f00000003c0)) socket$packet(0x11, 0x3, 0x300) write$binfmt_aout(r13, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x2d) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) sendfile(r13, r13, &(0x7f0000000180), 0x8000) write$P9_RSYMLINK(r11, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f00000001c0)) r14 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101004) ioctl$UI_SET_LEDBIT(r14, 0x40045569, 0x7) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0xfffffffffffffffd, 0x3f000000}, {0x5, 0x75c2}]}, 0x14, 0x2) 15:00:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x9f, 0x0) ppoll(0x0, 0x0, &(0x7f0000000380)={0x77359400}, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000480)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000002000)}, 0x0) prctl$PR_GET_SECUREBITS(0x1b) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000500)="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", 0x16a) fremovexattr(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000000)=0x3ff, 0x4) bind$inet6(r4, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000a40)=""/250, 0xffffff72) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000740)={'veth1_to_team\x00', &(0x7f0000000000)=ANY=[]}) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) sendfile64(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x4) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000200)={0x0, @multicast2, 0x4e22, 0x1, 'lc\x00'}, 0x2c) r5 = socket$inet6(0xa, 0x2, 0x0) getpid() ioprio_get$pid(0x1, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) waitid(0x2, 0x0, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') write(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) dup2(r0, r0) 15:00:18 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:18 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f00000000c0)=@ethtool_test}) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$RTC_PLL_SET(r1, 0x401c7012, &(0x7f0000000400)={0x6, 0x8, 0x5, 0x0, 0x7, 0x1, 0x6}) getpeername(0xffffffffffffff9c, 0x0, &(0x7f0000000680)=0x8c) bind$unix(r1, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000001680), 0xfffffffffffffe63) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r4, r5, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r4, 0x4c01) read(r4, &(0x7f0000000200)=""/250, 0xfa) syz_emit_ethernet(0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="c16a37ef844efa5a0783cb51295702b802f4143176a6eeff6667907b96bb81f849f63d96be00000000fcea1da5a996be48f08d6a26c47628d44acb877619db1731d021e9cd1438f7bd1c519f3e38e900f576477453a9e1112be97ebe9ce90a75ffc0d1b8bdfaa6e5b418a74363802007a247d1b9eb553ff6b826b5af64c14d622908308177a41206546f4f44ee767539d10ea30100b3ec8ac50b249c796b9a7c00bc0000000000000001ed6991eeff5c7469c18b6806b41a29f4b0fd06aca4afbe97beb34345f8589d1b4ceb390f33c96c760566fbad559c66ca7d0c52659b92ad07bc6e480f00ad35d0701226dc739f581d5f5fcacf87c67c64b6e7dd91e55e9beb9972be431d84133b9b4500403e9cb7df5d9b82cd1003415d0a27e4ea4cb7cda25985e78c50af96c26e79db2d428df19f86ca9d7e8e886119be0e5728e83919b203cfc56e7b1b255d9b4c6014c8a4f5eb8d477de0503c08175b27eb7274855305757311c3075797948f0b499bb6c1d3ae27819824f2bf35f0aa53c3dcd2b8f124dccb99efa54be6a0ad88e01452718a06000000f1e0afe2cc5d249078c0e81e78bf5a06e78f2e2352a2ba3f4684c939300b1e3a983c9e6f7da0808b70c9e70c0e9ff740270e0c0300000000000000ba90091e9b7b13bf6488de2f18da911ffe561f347b11092393840c444ddc0c1a15e2b86fd058442f53b6bac2846130cf090000009b4c299bbc3e5c1b09396a4f31be09082773991685ca2714de9e9c5687bc8f0e8f9e88e5a71896479d1d6a1e664f1566d6e0a1697ed9a6b413ffb3d96fe62a7ab046054094bd3d18a33a89af6993e42d31d4b71afb2de08298bc02f85eca6e12e5ab0a428b12f812dd6a30609ec9e0c2f5bf0fe7f66e85d0611ec01ee3857c8aa22eea51bd160c"], 0x0) fcntl$setownex(r3, 0xf, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sysinfo(&(0x7f0000008c00)=""/4096) bind$unix(r7, &(0x7f0000000380)=@abs={0x1, 0x0, 0x4e22}, 0x6e) get_robust_list(0x0, &(0x7f0000000580)=&(0x7f0000000180), &(0x7f00000005c0)=0xc) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000a00)=ANY=[@ANYRES32], 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) 15:00:18 executing program 1: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) fsetxattr$security_selinux(r0, 0x0, 0x0, 0x0, 0x2) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./control\x00', 0x410) inotify_rm_watch(0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f0000d19ff4)={0x84000001}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000140)={0x1, 0x8, 0x1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0xfffe, @dev}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x1) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0xb6c, @ipv4={[], [], @multicast1}, 0xff}, 0x1c) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) getdents64(r3, &(0x7f00000001c0)=""/248, 0xf8) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r4 = memfd_create(&(0x7f0000000000)='\x00', 0x0) r5 = dup(r4) socket(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r5, &(0x7f00000000c0)='\x00', &(0x7f0000000140), 0x0, 0x1000) 15:00:18 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getpgrp(0xffffffffffffffff) ptrace$setregset(0x4205, 0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000016ff8)='./file0\x00', 0x0) openat(r3, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="0002020100000000ff010000000000000000000000000001c258e06edfa486332ec928028683133e6ee9002e9cf3631f6118cd20d04a6b7761c5efbc62c2d39556ba46238dc12e2134625402"], 0x18) setsockopt$inet6_opts(r4, 0x29, 0x37, &(0x7f0000000000)=@srh, 0x8) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @local}, 0x1c) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="0002020100000000ff010000000000000000000000000001c258e06edfa486332ec928028683133e6ee9002e9cf3631f6118cd20d04a6b7761c5efbc62c2d39556ba46238dc12e2134625402"], 0x18) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="000004000000db48"], 0x8) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="0002020100000000ff010000000000000000000000000001c258e06edfa486332ec928028683133e6ee9002e9cf3631f6118cd20d04a6b7761c5efbc62c2d39556ba46238dc12e2134625402"], 0x18) setsockopt$inet6_opts(r7, 0x29, 0x37, &(0x7f00000005c0)=ANY=[@ANYBLOB="00717d0003655348dbcd7f11cd84d6dc8e53b4ace723b8b52f910a4818b92740af7e377aeb26f3a9b0f51f0242ac8ad9418d781ea8aa135c44542162f8c2005e80ede2a200233335b2fa053dd551e8f8132906705d2f66e77be7cde3deb0f660e9db63ce6f"], 0x8) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @local}, 0x1c) r8 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r8, &(0x7f0000000180)='fd/4\x00') lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() r11 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x4, 0x7, 0x6, 0x6, 0x0, 0x80000000, 0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000500), 0x8}, 0x2, 0x58f0, 0x3, 0x8, 0x10001, 0x4, 0x7}, 0x0, 0x0, r1, 0x8) r12 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r12, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="0002020100000000ff010000000000000000000000000001c258e06edfa486332ec928028683133e6ee9002e9cf3631f6118cd20d04a6b7761c5efbc62c2d39556ba46238dc12e2134625402"], 0x18) r13 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000000)=@srh, 0x8) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @local}, 0x1c) r14 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r14, 0x29, 0x39, &(0x7f0000000040)=ANY=[@ANYBLOB="0002020100000000ff010000000000000000000000000001c258e06edfa486332ec928028683133e6ee9002e9cf3631f6118cd20d04a6b7761c5efbc62c2d39556ba46238dc12e2134625402"], 0x18) sendmmsg$unix(r3, &(0x7f0000000680)=[{&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000002c0)="a014336aab7d9d63923fb7b3b48077867248e7c61c5208d2df4a7659cef483bbc397961ae7272acc96eb9ae7293425493d198dd537a65b85dd1d1e2cb0eb5d07874d82c0097e2797473408bf7880873b881097099b8b7d0aafad16ae5e29d0b12e0e0eb10e18b69d52d1e75cce7c28b7850b12cdcb1dde8fbe8312a760344814d7c8f2182bdb575d561a542c9e4353d14c9f05bcb1a9b865fce9060b839a2fabb2a85c1b917a028528a42151fe9f9526281590f66aa36fae30bd", 0xba}], 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="240000000100000001000000", @ANYRES32=r2, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r1, @ANYRES32=r7, @ANYBLOB="180000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="2c000000010000003b0e9d15f2036c54ef777fb703000000", @ANYRES32=r11, @ANYRES32, @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r1, @ANYRES32, @ANYRES32=r0, @ANYRES32=r14], 0x68, 0x4000042}], 0x1, 0x1) socket$inet6(0xa, 0x0, 0x0) r15 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r15, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r15, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c000000040000000000000000000000040000000000000000000000000000000400"/44], 0x2c) sendfile(r15, r15, &(0x7f0000001000), 0xffff) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r15, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r16, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{}]}, 0x10) 15:00:18 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e", 0xb8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='\x00\x00\x00\x00\x003\xfa\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = creat(&(0x7f0000000740)='./bus\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0x0, r5}) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r4) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000cc0)=ANY=[@ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x4000) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/user\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)=0xfffffffffffffdff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x2) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) close(r1) 15:00:19 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x201e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'\xeb\xff\x00\x98j0$\x83d\xe6\x00\x00\x00\xe8\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x1, 0x6, @dev}, 0x10) close(r1) 15:00:19 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x3) write(r1, &(0x7f00000009c0)="f7650582ceae5cbec87f468f7dcc39a3a3558f1c061d5efddc27852e87eb0ab9df10b96f30bf4e0fd76606159e194bc18120554cbaf1cf56ab60e139d744c8cba4f08db43925ba73d0629d8d8ba8a529347126ebf75f6e83ce67983e62973525a2b87a421b46edfed96478a271a06b4d325bd535a151a338a0973afa62b32b3f1c4d6de61f1f52aa6d5d23cab2755e9242b2fdf5c4a2f6780f984fc46a5817cae46d48e089e4ffb777fb86e2e28c1862ac3341508c8308", 0xb7) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x7) timer_create(0x7, &(0x7f0000000540)={0x0, 0xe, 0x0, @thr={0x0, 0x0}}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @dev, @multicast2}, &(0x7f00000007c0)=0xc) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000140)) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40246608, &(0x7f00000003c0)={0x4f9, 0xfffffffffffffffe, 0x4, 0x2, 0x100000000}) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) readlink(&(0x7f00000001c0)='\x00', &(0x7f0000000a80)=""/66, 0x42) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x101200, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000004c0)={0x3, 'ifb0\x00', 0x2}, 0x18) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r4 = memfd_create(&(0x7f0000000080)='@r\'self\\\'-[vboxnet0\x00', 0x0) fcntl$addseals(r4, 0x409, 0x2000005) ioctl$FITRIM(r1, 0xc0185879, 0x0) r5 = request_key(&(0x7f00000005c0)='rxrpc_s\x00', 0x0, &(0x7f0000000640)='\x00', 0xfffffffffffffffa) r6 = add_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000980)={'syz', 0x0}, &(0x7f0000001a40)="b7a1494a1392d2eea78a69af124a899911858b30f19c30aeb48f9c91ff30c2e3125088c947d701d2480d9c1cf09e2f90ff75b43a9ffc23863b2e82ec7ee97887b57f1dbb0069a70324a3c5716d5ccb6b8f5d3eeb2b480ffc9dd5736023448679428ccbce9a39ac1902f63ea477c2c7d777b1d14df25a96e55c6fe19143f05d885a953d8d75e6c562f4e7646dc47c16102da62b8340db26d4deda74f677bb54bae42fba3a626e2226d14bcae6557f8242f1f3e78be5", 0xb5, r5) keyctl$instantiate(0xc, r5, &(0x7f0000000440)=ANY=[@ANYBLOB="797074037320747e75737465643a20f9545bdfde30303030303030227d90303030303030303030310004008c8f89dccb6a24a6cd36dbd66a499dd507a44e6524c62150ccc60de4da5a9b82c7293e04178d75661b6c214dc688bf5deff55dc20882e7881adb4ef52671ac9a0287"], 0x1, r6) shutdown(r2, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000880)=""/250) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000800)={@ipv4={[], [], @remote}, @mcast2, @loopback, 0x4, 0x0, 0x0, 0x500, 0x8, 0x400000}) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x3) accept4$packet(r1, &(0x7f0000001cc0), &(0x7f0000001d80)=0x18d, 0x800) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 15:00:19 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000140)="11eaa50d0000cee47bf070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@remote}, 0x0, @in=@multicast2}}, 0xe4) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f00000000c0)=0x800000, 0xfffffffffffffd01) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(r4) creat(&(0x7f0000000400)='./file0\x00', 0x104) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/context\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchdir(r6) r7 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r8 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r7, 0x0, 0x2) sendfile(r7, r8, &(0x7f0000000040), 0x8000fffffffe) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[], 0xfffffffffffffecf}}, 0x0) dup3(r1, r2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) read(r9, &(0x7f0000000000)=""/250, 0x128b9372) write$P9_RAUTH(r9, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x7c, 0x1, 0x3}}, 0x14) 15:00:19 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea72", 0xbe) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:19 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, &(0x7f0000000100)}, 0x8) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000840)) r3 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000001100)=""/4096) write(r3, &(0x7f0000000340)="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", 0x531) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="74b7390de7945a154dd0ba0a73b42684ac90de5a2c373c2eda1fe2c55c9bf2b44a9c26284d1bab6662d350efb93ab3bb3944688a812a52ad44f6c915861efdb08a962469a7d9245e5ed886fa4b3a262bb867a2173305873682bc28cae6a3cc34524239cd8aad7eda16a9395c9fd298224fc2620bc5c70298d9f16e3e870cec710da71d3d322e70d0b17c182291e50e4c46473e1dbbb3d62324fd4b0d0fdd03d5bd7e87075b13d293195d9528ba105f47328a8a6a8d2019663e4492ac96889197ed92b4b9c04fa724e8e00be760a97611ab0d2a75"}], 0x20000000000003ec, 0x9) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r4}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x5, 0x4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r6, 0x80084503, &(0x7f0000001100)=""/4096) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) r9 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r10 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r10, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r9, r10, 0x0, 0x20000102000004) signalfd(r10, &(0x7f0000000000)={0x1}, 0x8) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r7, r8, 0x0, 0x20000102000004) r11 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r11, 0x80084503, &(0x7f0000001100)=""/4096) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000880)=ANY=[@ANYBLOB="090000000000000004000000000000000700000000000000", @ANYRES32, @ANYBLOB="00000000ffffff7f00"/28, @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="00000000c2a100"/28, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00I\x00'/28, @ANYRES32=r8, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r2, @ANYBLOB="00000000018000"/28, @ANYRES32=r11, @ANYBLOB="000000000400"/28]) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x200005, 0x0) 15:00:20 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000240)=""/175, 0xaf, 0x10000, &(0x7f00000000c0)={0xa, 0x0, 0x8, @mcast1, 0x7}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000001700)='./file0\x00', 0x0, 0x88) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000001740)={0xa916, 0x2, 0x2, 0x466, 0x7fffffff}, 0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x8d264d94b88cc547) ftruncate(0xffffffffffffffff, 0x8008200) gettid() r4 = socket$inet6(0xa, 0x2cbdf1a0d4ccb49a, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) r6 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x1) ioctl$BLKPBSZGET(r6, 0x127b, &(0x7f00000003c0)) close(r4) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x4000000028, 0x0, 0x0, 0xfffff03c}, {0x80000006}]}, 0x10) r10 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_elf32(r10, 0x0, 0x0) connect$inet6(r8, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) set_robust_list(&(0x7f0000000200)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, 0xc) setsockopt$inet6_opts(r8, 0x29, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="6deb098bf20000000000bb1b6f90a2d2562537037f12f29ee10c0a99689acd940a8e7fafdb91b37f00b7809133fd73816117780fcce0b1f8f113e125d029e3958b6a00ade8c6af25048a0eb56d166f6649ddeecdfe53ba447ccd0029f9b4d8a82043f68e533b0e9eee48f693e3cdb6b930af79dd0ff777188a146332b4767234000000000000"], 0x1) r11 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x6}, 0x8, 0x80800) fcntl$setflags(r11, 0x2, 0x1) sendmmsg(r8, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'\x00\x00\x00\x02\xdf\x01\x00', 0x40f}) 15:00:20 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x400, 0x0, @empty, 0x6}}, 0x0, 0x7, 0x0, "d5ad643cf588819d35bda963bd38dbcdc18e10bf14acdc9e739480afa40492d5a979adc5c70adaff43c170fe0ba2e6d5029ec904670e4c2cc1bb2e18b0bd3466c6bbb0f83c7234a40d7da5c95ad6e9bb"}, 0xd8) fchdir(r0) r3 = creat(0x0, 0x9) r4 = creat(&(0x7f00000005c0)='./bus\x00', 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, 0x0) r5 = openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x100000000000000a}) setxattr$security_selinux(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000540)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:var_auth_t:s0\x00', 0x20, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f0000000340)=0x9, 0x4) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) io_setup(0x362, &(0x7f0000000140)) io_submit(0x0, 0x0, 0x0) fsync(r4) llistxattr(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000780)=""/4096, 0x1000) fcntl$setsig(r5, 0xa, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000001780)="40347b55b44b684a88d0f1ac7a376bf26ee9f74b26c15eacf1037b413b87b567f4daf52fb6e8f8aa673d30c030281bfb345222224cfc743475f0b5e850607ac0d125b5db60549b7b636c118d0fb788b12513fcb09cb4e97303e288edc456f973862c68508cae6fbbaa1f52cb43d825dd72b2fa8f881a9b90df61ab9eb8b8") openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) tee(r4, r5, 0x928, 0x200000000000009) openat$cgroup_type(r1, &(0x7f00000006c0)='cgroup.type\x00', 0x2, 0x0) write$P9_RSYMLINK(r4, &(0x7f0000000680)={0x14, 0x11, 0x0, {0x12, 0x0, 0x1}}, 0x14) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCCONS(r6, 0x541d) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) getresuid(0x0, 0x0, &(0x7f0000000580)) getresuid(&(0x7f0000001840), 0x0, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getuid() lstat(&(0x7f0000001d40)='./bus\x00', 0x0) getgid() 15:00:20 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea72", 0xbe) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:20 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x2000080002000107, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd3\x9e\x84\xe29c\xaf\x8b\x00'}, &(0x7f0000000040)=0x1e) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x40000, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 15:00:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet(0x2, 0x80001, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r2, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000340), &(0x7f00000003c0)=0x4) r7 = memfd_create(&(0x7f0000000380)='\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xfffffdef) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) fsetxattr$security_ima(r6, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="d4fc06dd83c659508cdc38586985b2f7e41b1e"], 0x1, 0x3) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x4008080, 0x0, 0x0) epoll_create(0x5) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r8 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r9 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r9, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r8, r9, 0x0, 0x20000102000004) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r9, 0x6612) 15:00:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x208200) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x1e6b400e31bd0904, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x3bb7) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0x7}, 0xfffffffffffffe93) syncfs(r1) open(0x0, 0x0, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000100)={0x0, r4, 0x0, 0x0, 0x7}) 15:00:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x20141042, 0x0) r2 = inotify_init1(0x0) r3 = inotify_init1(0x80000) write(r3, &(0x7f0000000240)="95cb4bbbbae9e99bbe906b5578e07e5e7668c41f6dc28abeacbd9146403537dce974f9a43c1785125466881ee5ed15406cb377ef7d598d3348e91646e0bfd4e1e2e75e4ee81967c926aad2beada565174601ce3cc42554934be9e856276d5357d7320a6284d387718e27c9023be44a8e94f709b2bd2bcbc16c6c8c7cb39d32c5299c86d0a99a4e47d570f4a4bc4782c966fc308b48640eca364d5808eb9c56", 0x9f) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x200, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000300)=[{}, {}], 0x2, 0x5, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r5, 0x0, 0x41, 0x0, 0x0) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(r5, r2, 0x0, 0x8000000003) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000005c0)) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x1000, 0x0) r8 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r8, 0x80084503, &(0x7f0000001100)=""/4096) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0xa400, 0x0) r10 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r10, 0x80084503, &(0x7f0000001100)=""/4096) r11 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r11, 0x80084503, &(0x7f0000001100)=""/4096) ppoll(&(0x7f0000000400)=[{r4}, {r6, 0x3}, {r0, 0x180}, {r7, 0xc86b488c0f892b2}, {r8, 0x10}, {r9, 0x80}, {r10, 0x8}, {r11, 0xe2897557429ea1eb}], 0x8, &(0x7f0000000440)={0x77359400}, &(0x7f0000000480)={0x80000001}, 0x8) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) lstat(&(0x7f0000000600)='./file0\x00', 0x0) fcntl$getownex(r6, 0x10, 0x0) r12 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"], 0x1a7) r13 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendfile(r12, r13, 0x0, 0x5a92) ioctl$BLKPBSZGET(r6, 0x127b, &(0x7f00000001c0)) sendfile(r13, r13, &(0x7f00000000c0), 0xbf99) 15:00:21 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) mkdirat(r1, &(0x7f00000004c0)='./bus\x00', 0x6) setns(r1, 0x0) fchdir(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x64}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x4000080) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/exec\x00', 0x2, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141046, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000580)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)=ANY=[]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000740)={&(0x7f0000000040), 0xc, &(0x7f0000000700)={&(0x7f0000000800)=ANY=[@ANYBLOB="6400000061f1a7ee916419d8d11b68", @ANYRES16=r5, @ANYBLOB="10002cbd7000fcdbdf2515000000440009080800020000000000080001000000000008000200e55d0000080002009104000008000200a800000008000100f7ffffff08000200980e000008000200040000000c00060008000100090000ffc236000fafc61e4e40f6ada7c42e6c33ac1490be9197db688dfbdc4ca526c241932f2c30fc10233b32ec2696651487e0045ef385"], 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000894) sched_setparam(0x0, 0x0) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000980)=@v3={0x3000000, [{0xfffffffd, 0x8}, {0x8, 0xff}], r6}, 0x18, 0x0) r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r7, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) getsockopt$inet_opts(r7, 0x0, 0x4, 0x0, &(0x7f0000000080)) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@broadcast, @in=@multicast1}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xfaa27be0cc6ad7ee) r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f00000003c0)={0x2a}, 0x2ab) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r9, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$TIOCGSID(r9, 0x5429, &(0x7f0000000540)) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x244) 15:00:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x9) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/context\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$cgroup_int(r3, &(0x7f0000000080)=0x80, 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r5, 0x0, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0xfffffffffffffff9) sendfile(r5, r6, &(0x7f0000000040), 0x8000fffffffe) mkdirat(r3, &(0x7f00000001c0)='./file1\x00', 0x180) r7 = open(&(0x7f0000000940)='./bus\x00', 0x141042, 0x8) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r7, 0x27) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000180)=0x0) r9 = syz_open_procfs(r8, &(0x7f0000000040)='\x00\x00\x00@\x00\xdd\xa8>\xbc\x89\x01(4\xbdfx\xb6tQ-n\xde\xd0 \xba.Qf\x97E\xa9\x85\xba\x884L\x18\xf4\xa1\xeao\x16\xae\x85Qx)\x15%\x12\xa9\xeb') r10 = openat$cgroup_ro(r9, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) setrlimit(0x8, &(0x7f0000001240)={0x1, 0x4}) getuid() lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)) socket(0x11, 0x800, 0x7) socket$inet6(0xa, 0x4, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xfe2b) r11 = creat(&(0x7f0000000100)='./file1\x00', 0x2) ftruncate(r11, 0x2081fc) r12 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r13 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r13, 0xc028660f, &(0x7f0000000200)={0x0, r12}) open(0x0, 0x141042, 0x0) 15:00:21 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea72", 0xbe) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:22 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:22 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:22 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00zJ\xf9\x7fE^0\xed7\x9a\xef\xf8\xc2^\rMq\xdc\\\x1eR^B\xcc\xc34k\x01\x8b\xeb\xf7\xc0Z~.\xb2\x1b-Z\x94\xe1\xcd{\x90\x01\xeb\xef\x1dm\xa6\b[\xe4=^\xa3\nR\xeb\x8coV74\x80g\x06\xe1\xd3\xeev\xb9\xef\xd1;\x96\x9bj\x9c-\xd5 \xad\xd5\xc6\x96\xaf3\xd1qG\x9f\x05\xfe\x92\xc8\xc4\xed\xa18\x90\xa0\xac\xfe\xaf\xda\x1bS\xcf\xc1\x9e\x81}F\xcc\x85W\xc9\\\xe8\xe0\xe2\x19!^JP\x19}R\xd8\xf5\x88\xf6\x9c\x82\x9c\xec\xce\xe390\'#\x9a\xad\x96\r\x02`d\xaa\n?%\xbe\xa4X\xd5P\xdc\xe0\xaa\x8c&\xc8O&\x1d\x17\xd8AyaM\x00\x00mh\x8e!\xdf\xdc\xd8;\xe3hc\x1f\x8b\xd4\x8b\xcc_\xaa?\xfeI |ulZ\xe2-\xc5HT<\v\x1b\xcfT\xb2\xaf\xb8\xb7\xc4<6\xcf\xb3\x8e\xceG\xaa\x12\xc3\xde\x00;\xc0D](\xeb\xb9\xd9iV\xebA\xd2\x92B\xc3\x02\x85C\xf9\xfc\v:\x1c\xbd9\t\xa8\xe6c\xd8\xcb\x8aK\xebe\xfe-\xf9D\x1f\xecq\x95\xd7\x9f\xd7Bs\x14\x88C\x8f\xb6\xebp1\xb1\xdbR\x00\x00\x00\x00\x00\x00\x00\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000), 0x200002de) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000800005d14a4e91ee438", 0x39}], 0x1) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r4, 0x8200) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r5, 0x8200) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = openat$cgroup_procs(r6, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) poll(&(0x7f00000003c0)=[{r2, 0x40}, {r3, 0xc102}, {r7, 0x600}], 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r8 = socket$unix(0x1, 0x800000000005, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) writev(r9, &(0x7f0000000000)=[{&(0x7f00000005c0)="390000001304030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000807005d14a4e91ee4b029cdec040d475d36f7dcfda78a4f87992d73892f19f8f10c32f0c2881007c2dd3c605714036ece70ce89c9941fac985c638f3471a44e16", 0x70}], 0x1) fstatfs(r9, &(0x7f0000000480)=""/162) bind$unix(r8, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r10, 0x4c09, 0x8) listen(r8, 0x0) r11 = socket$unix(0x1, 0x2, 0x0) connect(r11, &(0x7f0000000140)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x80) shutdown(r11, 0x0) recvmmsg(r11, &(0x7f00000013c0), 0x39cd7fadb4b1263, 0x0, 0x0) dup2(r11, r8) sendmsg$unix(r8, &(0x7f0000000200)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x140}, 0x0) sendfile(r0, r1, 0x0, 0x400000000088001) 15:00:22 executing program 3: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, 0x0, &(0x7f0000001900)=0xffffffffffffff44) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x81, 0x4) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) read(r2, &(0x7f00000002c0)=""/34, 0x22) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000001500), 0x4) getsockopt$packet_int(r1, 0x107, 0xa, &(0x7f00000003c0), 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) io_cancel(0x0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x7, 0x4, 0xffffffffffffffff, &(0x7f0000001700)="cdfab2e9a729f3e6945d6e6e4296a3e487635d63d7d7e2c5f90150c0f35172da3525dfcc2c29eea03625f67ea78f199b04e88dc73ecc08818db10774681b635104255ca4fde57d75e4e795160f4a1404c3dc318c07944fb76dd0dff51a121fac65927b7b863c08aaebc8a0f340f61b836cbfdb9e61c05fefac2aac02abce40e54a799ac6fc4ad07a357c870d92dc2eb563e2a6d6ea7557616adf9e0179f0b9f1bbb61974b94af81c8a8aaf9ccdd9fdfef3c3fd63c673634007b411e17685e43c", 0xc0, 0xe, 0x0, 0x1}, &(0x7f0000001800)) prctl$PR_CAPBSET_READ(0x17, 0x2000d) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001}, 0xfffffe2d) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001440)) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f00000000c0), &(0x7f0000000200)=0x4) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f00000017c0)) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) write$eventfd(r1, &(0x7f00000001c0)=0x9, 0x8) recvmsg(0xffffffffffffffff, 0x0, 0x40000002) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x5) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001600)={{{@in6=@loopback, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001540)=@req={0x20, &(0x7f0000000000)={'nlmon0\x00', @ifru_addrs=@ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8}}}) [ 969.144307] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 969.172106] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 969.202440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1043 sclass=netlink_route_socket 15:00:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback, 0x5}, 0x1c) sendmmsg$inet(r1, &(0x7f0000002300)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001880)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001c40)=ANY=[@ANYBLOB="0c0000010000000007000000"], 0xc}}], 0x2, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}, 0xfffffffe}, 0x1c) sendmmsg$inet(r2, &(0x7f0000002300)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001880)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000001c40)=ANY=[]}}], 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000001c0)=0x7fffffff, 0xfffffcfd) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(r4) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/context\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)=0x3, 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r5) signalfd4(r3, &(0x7f0000000180)={0xffffffffffff7fff}, 0x8, 0x800) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) lseek(r6, 0x0, 0x2) sendfile(r6, r7, 0x0, 0xfffffffffffffffc) sendfile(r6, r7, &(0x7f0000000040), 0x8000fffffffe) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_UIE_OFF(r6, 0x7004) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f00000001c0), 0xfffffef3) vmsplice(r8, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) fchdir(0xffffffffffffffff) 15:00:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="390000001300090065000000000000007f00804006000000460001070010001419000400040200000000000000000000ad57809bfe9bc70000", 0x39}], 0x1) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e22, 0xa6db, @remote, 0x1}, {0xa, 0x4e24, 0xffffff4e, @mcast1, 0x81}, 0x20, [0x5, 0xfffffff8, 0x0, 0x800, 0xfffffff9, 0x8121, 0xffff, 0x7]}, 0x5c) 15:00:23 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276", 0xc1) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:23 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 969.709155] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 969.739983] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 969.941248] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 969.964839] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1043 sclass=netlink_route_socket [ 969.984966] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 15:00:23 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 970.371783] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready 15:00:23 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da, 0x1, 0x0, {0x7f}}, 0xfffffffffffffd27) write$selinux_load(r0, &(0x7f00000003c0)=ANY=[], 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) lseek(r3, 0x0, 0x2) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x1, 0x1) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000040), 0x8000fffffffe) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/policy\x00', 0x0, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r4, 0x1, &(0x7f0000001b80)=[&(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000b40)="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", 0xfd4, 0x4, 0x0, 0x2, r3}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) fstat(r2, 0x0) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r5, 0x89f3, &(0x7f0000000080)={'ip_vti0:\x00', @ifru_flags}) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r6, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x200800, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) 15:00:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r1, 0x208204) r2 = open(&(0x7f0000000140)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r2, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) r5 = socket$inet(0x2, 0x3, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000100)={0x7, 'ip6tnl0\x00', 0x4}, 0x18) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r6, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4044) capget(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) prctl$PR_GET_THP_DISABLE(0x2a) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) 15:00:24 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276", 0xc1) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = creat(&(0x7f0000000740)='./bus\x00', 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './bus/file0', [{0x20, 'ipvs\x00'}, {}, {0x20, './cgroup.cpu\x00'}, {}, {0x20, '/selinux/user\x00'}, {0x20, 'ipvs\x00'}, {0x20, '/selinux/user\x00'}, {0x20, 'ppp0cgroupGPL'}], 0xa, "6bbe96689e0a659155545da144b9dee77e6a3d79dec0235268ef678dab270363b27de227dc5d46b81e01b172127776cba870de3ca3087e15de7e1e479fa8e9093c65c08c061f5da1fae03d6f644ef95ed996a85bf2fe6d91dd6a94be390dbe70d10139f669a2bbb71dc9c27b5f309115fb2bb5a81b7a716a95f325f491a38a2d1f4cb95f05b4db33ee90c8dfac0562d40d1e208ed9982d0e48976befbadc2150fe"}, 0xf8) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r4) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000cc0)=ANY=[@ANYRES16], 0x1}, 0x1, 0x0, 0x0, 0x4800}, 0x4000) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/user\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x201a00, 0x0) getpeername$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)=0xfffffffffffffdff) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r6, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000001080)=0x1e) close(r1) 15:00:24 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:26 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00zJ\xf9\x7fE^0\xed7\x9a\xef\xf8\xc2^\rMq\xdc\\\x1eR^B\xcc\xc34k\x01\x8b\xeb\xf7\xc0Z~.\xb2\x1b-Z\x94\xe1\xcd{\x90\x01\xeb\xef\x1dm\xa6\b[\xe4=^\xa3\nR\xeb\x8coV74\x80g\x06\xe1\xd3\xeev\xb9\xef\xd1;\x96\x9bj\x9c-\xd5 \xad\xd5\xc6\x96\xaf3\xd1qG\x9f\x05\xfe\x92\xc8\xc4\xed\xa18\x90\xa0\xac\xfe\xaf\xda\x1bS\xcf\xc1\x9e\x81}F\xcc\x85W\xc9\\\xe8\xe0\xe2\x19!^JP\x19}R\xd8\xf5\x88\xf6\x9c\x82\x9c\xec\xce\xe390\'#\x9a\xad\x96\r\x02`d\xaa\n?%\xbe\xa4X\xd5P\xdc\xe0\xaa\x8c&\xc8O&\x1d\x17\xd8AyaM\x00\x00mh\x8e!\xdf\xdc\xd8;\xe3hc\x1f\x8b\xd4\x8b\xcc_\xaa?\xfeI |ulZ\xe2-\xc5HT<\v\x1b\xcfT\xb2\xaf\xb8\xb7\xc4<6\xcf\xb3\x8e\xceG\xaa\x12\xc3\xde\x00;\xc0D](\xeb\xb9\xd9iV\xebA\xd2\x92B\xc3\x02\x85C\xf9\xfc\v:\x1c\xbd9\t\xa8\xe6c\xd8\xcb\x8aK\xebe\xfe-\xf9D\x1f\xecq\x95\xd7\x9f\xd7Bs\x14\x88C\x8f\xb6\xebp1\xb1\xdbR\x00\x00\x00\x00\x00\x00\x00\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000), 0x200002de) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000800005d14a4e91ee438", 0x39}], 0x1) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r4, 0x8200) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r5, 0x8200) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = openat$cgroup_procs(r6, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) poll(&(0x7f00000003c0)=[{r2, 0x40}, {r3, 0xc102}, {r7, 0x600}], 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r8 = socket$unix(0x1, 0x800000000005, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) writev(r9, &(0x7f0000000000)=[{&(0x7f00000005c0)="390000001304030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000807005d14a4e91ee4b029cdec040d475d36f7dcfda78a4f87992d73892f19f8f10c32f0c2881007c2dd3c605714036ece70ce89c9941fac985c638f3471a44e16", 0x70}], 0x1) fstatfs(r9, &(0x7f0000000480)=""/162) bind$unix(r8, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r10, 0x4c09, 0x8) listen(r8, 0x0) r11 = socket$unix(0x1, 0x2, 0x0) connect(r11, &(0x7f0000000140)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x80) shutdown(r11, 0x0) recvmmsg(r11, &(0x7f00000013c0), 0x39cd7fadb4b1263, 0x0, 0x0) dup2(r11, r8) sendmsg$unix(r8, &(0x7f0000000200)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x140}, 0x0) sendfile(r0, r1, 0x0, 0x400000000088001) 15:00:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) sched_rr_get_interval(r1, &(0x7f0000000080)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x800, 0x0) r2 = accept4$inet(r0, 0x0, &(0x7f0000000100), 0x101000) r3 = gettid() fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={r3, r4, r5}, 0xc) r6 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x400000, 0x2c4) mknodat(r6, &(0x7f0000000300)='./file0\x00', 0x400, 0x9) r7 = socket(0x1, 0x6, 0x5) getsockopt$SO_TIMESTAMPING(r7, 0x1, 0x41, &(0x7f0000000340), &(0x7f0000000380)=0x4) prctl$PR_GET_NO_NEW_PRIVS(0x27) r8 = dup(0xffffffffffffffff) ioctl$TUNGETVNETHDRSZ(r8, 0x800454d7, &(0x7f00000003c0)) ioctl$TCSETXW(r8, 0x5435, &(0x7f0000000400)={0x401, 0x8, [0x1, 0x8000, 0x0, 0x200, 0x3]}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000440)={0x3, 0xfffffffa, 0x2, 0x80000001, 0xfffffffb}) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') r9 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r9, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xc8, r10, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9db5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'ifb0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x48801}, 0x851) vmsplice(r9, &(0x7f0000001940)=[{&(0x7f0000000740)="7f52540c8eeef4fd6916b5e4ce29a42fe32548d96be0e55162543ffb8fc839a0b6638955eada7972721b156777af27c1c52e81b0316382ed46db9b6d01fe216c82f0007478b8127748fec435fd4019393adacd7a44e17a4d66f026db735dfccb0d919b3558fd98183e1a135aa0202d325805c047887d85b56207b9f4e064ba606689667f233fa54450984f515440e84bccf54b7bcfa9c64e1a300b8031ac80bd4ae14138b4a4a196f64ea1e68dfd4206ba9e9dbf07d200156882904f18b692ae336ff3cf78923a54f0371f538e99e628fe50f3156c29088de52f1e1f3b93632f5fa8bcce7c818587faf609cdfc59f892153645f6d9889d1319e16f458b0a2834721cb5dc9392d844e53aa79277ccf8377feb8bbee8c7b1dc61fe6a66b5df76bd9f806706ea0d49802a2280af455f4220872a9b01f082f3c4e1ebfa0fcb7a81ec052cf32951d32dd0d3b6d3df9e342e51e14120aa1321bb47a7efd0d0f5256e20cef71e55ab8cebced6d8c6061431535c8c5aadb733c3e9edf06e9b5677d23c43a1301e67d4f62514532cad375101ba5a243e2e0338513be23dacec1474f6e823094d0f57726822c35d15fb2c020c2b7dc199342e6ab630d2960545c0b918ba3c49eaa51da7665a7d43faaa86be07a24ca748f57192ea31c880cec5eeed19ae7949f618f13d3507180b55e06c4def01fe019b6af413fb1cbc0561ab5582e48bdc1850253904b804291239d2af4ed3d9fc59cae2164838ed1b6a3ea45b11c40ce9b68adc898ae82877b149354ec4498e64932e1df0bc41be3e8c2b750601e7a45f5514cf9016c17bdd139f9a722260f0d76742591265f40df030627028a0747aaea3354dae99071e245d5dd39ff99954524516d08a3591de4e2316d356ce4ed10abf16b09892ac365c0905d513069e93027123e04fcb57e36bf0ef9aaf36736d3c4b25b3a6bb4bc883e002e1ea558d3023fdd6c85439edb688b384f06f89ffd8390e5cce8c2c03ce6fecaa60e6e0e64b13420a322d9b2d1bbc84fcee8aea796708d60dc718b0372e8260cf1f192fd5647b6e9472e89b0484214817d61118cead4bdf42d41e99b591120ba7473952c4eb457bb6102d0b04ce6daba289eb65e1810c6c4c995aa8828ddd53899133f4f8ed0a39a99f48b293750da6d06870e12778ed0c50fd9a7142c8b93595f8715ffa7ab9969b0aa819b3d495bf82e4257d4a9562f41d1feca43e38f32bd7f5e8f598abfa992ff336764be48022c7c3897e6f56f4d2ad1dbb977f110870a3c518b5116e59345b17a01a857117470415a18d888b992e654d3123f927b621c3ce38e464c44e7e6bcfc6c876927073b1d2d70fc3aefe1a1c2b74e124bb8c607a8b05a0dc5c6493bb14015015f1bfdd8800d7b81d29ed4360720723c0426fe93234408ba4d48b470410006aec1a6c2e4de4940f17f86dc97eece451bdc7e2364443d81e444b6ee514713ed5c9882818506700520d01352f20d4b89365811167562847f2072e285562bd2b45da4b0dac18787e4ca3723601529bdd7eb9ab8163873cb560e3257a89774411958effce1ae0eb7b56ead6930abbd40f611ddde6ce913133f85647ee2cd6336725915aa331cf3306ad0182618576b87e1e9ec296c9581688d20dd4ea22ef9edafc56bd9d34e5a9c7005a71c46e04ec2e62956384b7e27638017e5ff3dc8777b22630ea571992ec6eac5f136884cc1a69cee79bf0cd4650cc706315f315eaa66106c073dea334d05a5372e61b7b4453a6ae8671fac4b39b07754c1f9b1123af3d5e072b325f83e16ab3f9e11fb1faabcc4b3270fb6f10373921403af64492d325d107467b6627b4ccd8f77e59cab4a09d42a43874d2783648e69d20433f624d6fe6af22060e56e013c05a1004361c7a6e63735dacddcb31a854b11ee1cb733a36e102daf498399955840d2e05bc5d96ddc727a10a7561193d40422f52491be8df132f8a8989577d96147a63b43bc631dceab26fae2dc20227fe9b0bbc0b24be6a1194ac696732c9f7b04bfbe03a208a101cc510f2332c5708c17a13085f78ad05e1372a22079b07f38397e05410fb741bf15f23152f0e7ae1075759ad97780290b4b367bdb791d0cf3cc758e8a133a53ee017c8e381694d866cc2cc1b7792e56d2b209eb9feda54298f00e54d005e55d23785bd4cf62dbbc6cf77485f8a80c17343dea3e3ac42e746fdcf3f54137006b54a8d94a7f5f12c55a9345c1215deb6f1b2336315fcd34fef65108a63a3b169702f281e0b3943966cb895e65809471ce45b7ee08cf9c15f41bf4d1fe85fb7588cf4a9e41139db12b79acf7c14192d9c6ca64f50b95bdd626b4b41775f731dd37b459541f2dfb19f6f9e43a3b816f9f277b635c01bc6a5414fcb70d20c0ea6013d24bd150ff1a3e729dad6c584587e31209e1b942ad21ea7adf2980d1ec333880e23be1df9b438cf004aca850d2b436399ad4c0254e5621428e28ab9de2350f7212e774a3116cd1aa2dc10b17bd83f0da2959db5fcc92a304de0dd863a1f63c047038ea5559b751256a7eff3c2d477107b0221ddd7dee29c6725e2e0cd2ba5ea905adece712afd0e58aa13c3553fb9d10d75bd6c37dcc64c80c88f50d75668846578242d27c997dac53b84ab9b8753efc7775b5b7d8f1aad4a6599b49752b4136817cc794f9d31fa8182fa43637a33dc2a933a244b38eea8ebae182846c8bacbde10dfc32232922548096c84b6c2c08db92a689c5048c0c560c9af47d9d5916756eb14e29de7f84d9501e9519d8049dce33fffb2ae498af96b3709dc82e2ef5cf8473f260a8cec5ce7f022ea5739ac139b3ead48a75131cee47aae7fc0d45d1f4d4c1cfa2f17e88a13c3ee46c403e2ba09b5dbe0b163dfc5caeed8f1eb9b624f2967a590e9292133f1c8f4e5e6b3cd68a27e2eb1acf1a36995ed874304be489302db26360ce559c3a4bf7f8f77452e369e44c29c8503facd4a1f02fb6588e4f8b2243da1eda0294db84395abc76a3bd6b08517de2b021dc16ac621d1acf9dc26264d35a751ab4ae07dc1aef93f1814285646bbaf26918578f851c14f56d481e826b727e21a3c654351200a2a3e257eac7d1173f4c0f682818a5993cf28682b31bce14974d593df2c7df5b0075120f176c2d4cba0dc5e463a0de220d2b154d8d5d18c2410ec895c41933bb31df6b07f5b034798f982e7ee57a82967815d750d27593180a02759f1a16d271d6796bac6d4d6830c37c1d55838558495fb556b051fdec6cbead1554b09a0a0b35d496acd82ee45fccf6208d1cf258ad513a91a3bdc8b619c2765e5c1a3b46073956e4721e2414fdd7a1c6ffa82a62e785db3c73d4f64158ef4b2531d9daa5bd17dd3a495878d50da3a6b18d1772d96cacfcb2b2b82da3f2b6d79a114746859bae3a6240a5828472a0d863348b20660a17b25e402a58335142dda24a0dd220b15168f10a68e5de3235fbee088e60ce170e281a6aae324a23f9bbe58d147bc0f042f577c57f3a9173cc703f040299217a9475a06345a8e8f4e1a3e0d59c8bc0826844ce53102690bb16f48da3147f0ac64fae5b07b5e6be20bbb2c140c376014ae1e431e02c652c1cdd0e8e71e516b1c6ff73c27211dbfea65aa1eba23ee393fd6337c9f48e85fde7979345b4eb740a97c363f39c7c5ca2d6c065c4e64b9bf47742d4c552dd71a39a9437896b4a51d62df3469cb676e2e5e490d9205fa0e4595743d619582460540f640589118e78b824cbd1935f4bfee32e0c3638c4bc33f227bb0839893cd0108f0d85e1c0aa961f09cbea1efb80d334f7e37f2e0f7ec7185f019c1531aa1e946d19a30d5f1eafd25067a9f730858b39b851100e72d4129a18c384cbc7d5b693b806b9ddc193b0edee0b12934a27d40dfbf8e734dd1beeb4011e85f6e2f8ba0493e74acc385521a7e587d59cdcd58ba91edcbacae1d8368fbd6a220645df870dfd7ccb1ae969791f4e4d7876f4fbfa89c35a363c8139c471b23c0172e9ee4f28a8b410865f431d05a1188885475197583ee6502919de2f2f4c772e6bf94ca0d6227eeed4ba60de227c9d2a2597d87099bd9d09c6a3721cd3bc976ee30a03df23b950be2ea3d5092db91caa966b5610dd12bc895a49ab9883fdf9627e6b8e205ea0243cb345b714d153525cbbf741f2f9d2f55bd1fc0be0ad4850b05c3d1f95c11ca9aa6ed629e1aeae3a3e1fea37fb7783b83ed4d729c45cfa3da1f34fa96a98dd5f029d15f5bd7f3715763773f579a94a8f90cb2508195c8c187d5348dcbc56bec46c1bbffd71e8dbb36cd6114b2c0b47719984ca1a85d3095e78eff5b2a3bddf0abab35942a64d8dd5749ca48819baf7a952583f653a696243b53de62f9d6e4643893a4f2a6b3f1627dc64c882c7340a5c94f622eb13af7df5e6db957de2426f2373f34d98e8e56efad23611e00ad191e5303f983072190450df0a420d048d76bc2b8bbbba23d3c32069e0f4e5f2757e5b4c505d9768f680e0d69f14f143f864a5f24e45bdb6205751fcfeeac831071f15e9230ed1ab9c243827af9978f59d8e1a8ec71c5dd21ea08efd76c32ff57a61e5c9fa0fba8348f2844396344a9bfadb893150635fe1f928cbc1013f4e9c88951387c75959f7d52a4f4eff745405f8b6c0716175cb272328663768d41c11a43a2df27b9a7715c0ea67c8ae702fdf9914ea7ee8a379fcd64aa345b97570fc6c0eef193d976bdcbf1112a14c626b1bd1b1b18723ebf053187474e70f55ca3d99672d7866462dde6c5dac1ecf5d72976b2b5528dd5b4482f9274382b3a11117012f19fe55db7418a65f80f11805a8edf85e6cf029a9114fc0668cc7d4063c86c7e7ace8bcc5703bd61fd4a353cf440eab399ed1ab936aad0a1f09662de0ac4982deb4df1c2c64ed029775bdf64b9b9e63760deaa393dd0418394e5dcf880a02a32a97e1224929219eb60f72077aa243aedb10047ddf08d83c559d1aaeec4517aea754e38b0bfbd3dfe28b3a3c8f5f9d4cacd1c6dd7e7e2b4b3786fb4641774de8fe12927d6d56686f83d8c2647879ed2e4de48cc8a58c15c3fb2877a2e67b97534153cf561277d6e713eca69562d019c9bb118c2f2354db13c4975a1541ec045661527cac2c054cdf30e1d82fdc0210ec5dd3492863c816ba2fba72200a897ddedcb4e9f2f7d1279c579023787654def60be9dd47a871c1a67bd42da5902f53e5a1b0b53f9ed37aa2141bbabe03a3aadd0b70e727d720bf420dec496bd696880907de950486b71a1b0ff5d4fb9bd2feb8b652b82ca5055a4c0d69bbcfd6567d3048b64d82d415f6187918589fcc8c97795f5613acec7d0ce4bf1fe066fd6d27c1fa17606205380f691d3c2c2fa0303d8c44a9a33938c22c2b21ef8a24f4c056bc529604d5bf2a1a5f735f2684bf3704dc038cd9becb4f7508fe815f85847de44f1407ee9c7328c508483ecebbfd726672ec82b432a5f460ffb2e4edd5d3ff68bedd32d8e5891b2a05531396ce7957e4bb26e2c3f26743287535685aac4bedb65b0a404ee39f79890111e868f25fda2292c95bad8d6ce4b7623fad59a8f962b0edd5151774a37530e2b91d108010ac0105a728d4912fe1fbef16fb2b0078313d120a83d73d55b59d1cee1cbba6ee6df1a35e20abe04919b0316e82b9861cb2d41dc2a4a883a0bdaba9dd0e81c168c44edb9d48efe69413d65c9540ec5edc53547f264802d92d18432cc96263afbafc185150dbc303dca2422e62836a1cdbe9b31c4123b5cfae15c4c3a0dfd5d5c09333dcca4d3998a2b342439dd12eb", 0x1000}, {&(0x7f0000001740)="a2f63e4af12d7fcee2b186088ca27d82cbf6f2885bda54b652a9552eda", 0x1d}, {&(0x7f0000001780)="11dd7d00db02e79c4538aed117d25714c0580a4105763a466518c4e59d835b730d2cdc9503158cfb2ac5df7dcd316391bf43f9718f46fa54d7429999b4f6df73d63f688a1b00533dbcb4ed632bc79033c6bf", 0x52}, {&(0x7f0000001800)="ac97e98f57a0332527c1502625813c500a67cc12cc0ff2af712992d8ae553ac3af56c6fbcc7504cb6306c4cde68381393c160a607d191fb3fdafba8e007afec510562542", 0x44}, {&(0x7f0000001880)="411e0cca9f08c42788eca0ec5fa784ffeeff277206fe00d6fea09ec5a410902de4a463305102fe5d049cae6cd4224477ef5efca92696ef9405ac4f861d23d6cafbc2c3dd37c8317c01daea8cbcb5be660eb3b263b298587919b8fe4d1ad4af8d786374f9a26d6df8a8af5a4b48266c1828ddb3e9165b77b0946825aa4f6431512063d8c3daeab8579cf717df3e9b0b2d3190f4a83445fa7782b70cdd8b12dad8d61410a88200c1e238c2d3", 0xab}], 0x5, 0x8) r11 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001980)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCSFF(r11, 0x402c4580, &(0x7f0000001a00)={0x54, 0x400, 0xffff, {0x8, 0x40}, {0x9, 0x8}, @period={0x59, 0x8, 0xfffe, 0x7ff, 0x1, {0x7fff, 0xfff, 0x0, 0x8}, 0x8, &(0x7f00000019c0)=[0xea9, 0x7, 0x5, 0x92d3, 0x400, 0x2, 0x0, 0x2a9d]}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000001a40)='NET_DM\x00') r12 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getflags(r12, 0x401) r13 = creat(&(0x7f0000001ac0)='./file0\x00', 0x10) write$tun(r13, &(0x7f0000001b00)={@void, @val={0x1, 0x3, 0x6, 0xf2ff, 0x8000, 0x36}, @ipx={0xffff, 0xbd, 0x1, 0x5, {@broadcast, @broadcast, 0x24a}, {@random=0x8, @broadcast, 0xfff}, "7390eca50186ee8e121b677b5397db9e74881dbc8d7826f52e8a09346ade2e241fa046ae9c178c9ce7bc199e197f7e742bdcf1fba71dc55003a62d91762eb33adf2b55d6f0c068b4ffe61feb1aff0cd23cee428a6e0f1f2972b308fb093ddc6f59ecbc5dac4544411cbe7d7a3f7def7d8ef4969fe0e6f3bcf2076f0f6d9d0542a64ee618a1531f2cedc108a63004eba7e8e800230220f43c098aa7aea19051"}}, 0xc7) 15:00:26 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') clone(0x0, &(0x7f0000000140), 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x2fd) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) clock_gettime(0x0, &(0x7f00000011c0)={0x0, 0x0}) futimesat(r0, 0x0, &(0x7f0000001200)={{}, {r1, r2/1000+30000}}) r3 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f0000001140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001240)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$search(0xa, r4, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r7) r8 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080)='\b\x00', &(0x7f0000000680)={'s{z', 0x2}, 0x0, 0x0, r8) r9 = add_key$keyring(&(0x7f0000001180)='keyring\x00', &(0x7f0000001280)={'syz', 0x3}, 0x0, 0x0, r8) request_key(&(0x7f0000001440)='cifs.spnego\x00', &(0x7f0000001480)={'syz', 0x3}, &(0x7f00000014c0)='vboxnet0@\x00', r9) r10 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'\xf3\xff\x00', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r10) r11 = request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000001480)={'syz', 0x3}, &(0x7f00000014c0)='vboxnet0@\x00', r10) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r11, 0x3e, 0xde}, &(0x7f00000003c0)=ANY=[@ANYBLOB="656e633d72617720686173683d7467723136302d67656e6472696301000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f24d368ad42d2b0e48f66edc460c6997773bb98ca3fad51bf11b2d8a0f09c61c36466a59fa60051e568e25bde6d975269c3bd674bb4ea3ef7081070d8f0c4578c6fbb40a3a3afcbf6e1af38785a6b7c9e22e12c252727dee95ac73ce5e75478163eee7a2ee14898d0ae8cc08e69eccebef7ea06"], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a0c76de32", &(0x7f0000001800)="6f0f14bd073231307059e78d0bb09dc05e5ab9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f51054957ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887b960b6d2f3a5") keyctl$negate(0xd, r3, 0x80000001, r4) writev(0xffffffffffffffff, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, 0x0) write(r6, &(0x7f00000001c0), 0xfffffef3) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) gettid() r12 = syz_open_procfs(0x0, &(0x7f0000000100)='net/mcfilter6\x00') sendfile(r12, 0xffffffffffffffff, &(0x7f00000000c0), 0x7) syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) 15:00:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r1, r2, 0x0, 0x20000102000004) fchdir(r2) fchdir(r0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) readahead(r3, 0xffffffff, 0x0) 15:00:26 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276", 0xc1) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:26 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276", 0xc1) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 973.157857] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 973.185514] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 973.220947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1043 sclass=netlink_route_socket 15:00:26 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r0) creat(&(0x7f00000006c0)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./file1\x00', 0x20) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/context\x00', 0x2, 0x0) clock_adjtime(0x3, &(0x7f0000000600)={0x7fff, 0x0, 0x0, 0x6, 0x4, 0x7, 0x7f, 0x7, 0x8, 0x3, 0x1, 0x8001, 0xffffffffffffffe1, 0x2, 0x5, 0x4, 0x2, 0x4, 0x8, 0x1, 0x84, 0x7, 0x2, 0x8, 0x6, 0x1}) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0x9, &(0x7f0000000080)=0x20, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x29e) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) sendmmsg(r5, &(0x7f000000c6c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x6e, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=ANY=[@ANYBLOB="000000001052f6fbad040000", @ANYRES32=r7], 0x10}, 0x0) sendmsg$unix(r9, &(0x7f0000e4ffc8)={&(0x7f0000beb000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000000d000), 0x0, &(0x7f000053c000)=[@rights], 0x18}, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x405bc0) r10 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r11 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r11, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r10, r11, 0x0, 0x20000102000004) r12 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r13 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r13, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r12, r13, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r12, 0x4c01) r14 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r14, 0x80084503, &(0x7f0000001100)=""/4096) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x111000, 0x0) r15 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r16 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r16, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r15, r16, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r15, 0x4c01) r17 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r17, 0x80084503, &(0x7f0000001100)=""/4096) r18 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r18, 0x80084503, &(0x7f0000001100)=""/4096) eventfd(0x9) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r19 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r19, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r20 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r21 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r21, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r20, r21, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r20, 0x4c01) socket$netlink(0x10, 0x3, 0x1c) sendfile(r9, r20, 0x0, 0x20000102000004) dup2(r18, r19) close(r8) close(r6) write$P9_RFLUSH(r3, &(0x7f00000004c0)={0x3fc}, 0x1a6db1e6) fsync(r0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000400)={0xffff, {{0xa, 0x4e23, 0x0, @local, 0x6}}}, 0x84) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0xf, 0x9, 0xff}) write$P9_RSTATu(r3, &(0x7f0000000580)=ANY=[], 0x2) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="000240c80500000000000000e4e1f4acb0caf529bca3559c0dc80a13342c1fdb5f7d18cb1512b58ccb2ab0fa5536b2fcadb0baa58b3f560d8d8e9d3049a39404493768a832dcc543e7f4f4fcb3c3153dca37b03c66d2034b6b088bc70080008049b6"], 0x1) 15:00:27 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:27 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b", 0xc3) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:27 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:27 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) dup(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) write(r1, &(0x7f00000001c0), 0xfffffef3) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x10, 0x4, 0x0, 0x0, 0x3f}, 0x0, &(0x7f0000000040)={0x1fe}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) getsockopt$inet6_int(r6, 0x29, 0x50, &(0x7f00000000c0), &(0x7f0000000000)=0x32c) pipe(0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r8, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r8, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r8, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r8, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r9 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r9, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) sendmsg(r8, &(0x7f00000006c0)={&(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r9, 0x1, 0x4, 0x1, 0x4, {0xa, 0x4e24, 0x1, @remote, 0x4}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)=[{0xa8, 0x116, 0x8000, "b8886e86438957c3be95f51b1a5dd03695668de4b9fc5a56b12eecd632fa9150096e456bd6640acd4e7b1963d79ddf02bad5031b310bbece78d4ab4742762e3aac282849cc63f50ab4ce3b4b88bf8b61e9293525876cfd59d7ed31256f094af26756294e5ee34b8db275ff6616cfcd92c81b245229c285ddd8f0ac2ef83585752d37364c38fede197ce9a903db99aac92fc99422c0ad9650920b"}, {0x34, 0x125, 0x80000000, "d6cce1d4bb3f57a53adec23802d76f91c1b4411874a6af24df1c0fb5fc681fe4d4683b49f3"}, {0x100, 0x104, 0x1f, "c9ab3998a7375120ebdcd1861ca20a70994049077304b1b1283e840bcd858bc0d64b79a9d1f9a4badf9f9b04443bd8470c7dc86ac7d0369a166308ec9c3be6c05edd25fecf2528103bd90f3cde84d9d7c74b63b273e24c71b10ddf8b9df7dea06ed3de4a425fa094af0208e843bf4970b741a22e8108644f88a2cb536b3a4d52fd56a7a068d237d8fccbd63177ac3b27d8a1f1f241873a52cac8040697fd4cd4079fd6c098f52169cd1bc800c6d2ed1b37e123087a8b5e90c3396d4096b09396cab8dec8a754fe36ac2c17e1a9914adaacb3ee83a8af5462309a65a991f3aa22e46c8ea0565cd11b15ccbf1a2b740afac12b"}, {0x34, 0x108, 0x51, "a0b043983b756e7f9c81995838e9c6be45afe6a6a01a70c359071d1d1495958d79c51b4468d4e0"}, {0xf4, 0x118, 0x101, "901c54393e2ef4c2f557662ed67296ce88c60495ab906565c03e7dd5e2a245d3779f5f9ff90760bc21f7563e6f18c7bd4c01b5cf78119dd7331dbe9e71dbde2d6d7f15cf73e45aad9c7cc0048ff1e4293fb029720b5f270e1e98e76dc90a83e763e48b59652c8e892bb7ac64723e8c3146e75cc9a59207a146e267dd34dd4f8edca2f1f1a4b3f0e1a1c70f433d0127c7600a6cd4de8068449274b9c8553cf580f4ed03501352580d995d3d51b2db3c4103dd3ce18bfae215a699ccc061c03deaff90e0ca18e1aef30678ed1360fa8027f962e193635cf418fcb00538ded16adf0d2c5d351c15ed14"}], 0x304}, 0x37fa383d3ee23a5a) connect$inet6(r7, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f0000000280)={r10, r11+30000000}, 0x0) eventfd(0x7) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) 15:00:29 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00zJ\xf9\x7fE^0\xed7\x9a\xef\xf8\xc2^\rMq\xdc\\\x1eR^B\xcc\xc34k\x01\x8b\xeb\xf7\xc0Z~.\xb2\x1b-Z\x94\xe1\xcd{\x90\x01\xeb\xef\x1dm\xa6\b[\xe4=^\xa3\nR\xeb\x8coV74\x80g\x06\xe1\xd3\xeev\xb9\xef\xd1;\x96\x9bj\x9c-\xd5 \xad\xd5\xc6\x96\xaf3\xd1qG\x9f\x05\xfe\x92\xc8\xc4\xed\xa18\x90\xa0\xac\xfe\xaf\xda\x1bS\xcf\xc1\x9e\x81}F\xcc\x85W\xc9\\\xe8\xe0\xe2\x19!^JP\x19}R\xd8\xf5\x88\xf6\x9c\x82\x9c\xec\xce\xe390\'#\x9a\xad\x96\r\x02`d\xaa\n?%\xbe\xa4X\xd5P\xdc\xe0\xaa\x8c&\xc8O&\x1d\x17\xd8AyaM\x00\x00mh\x8e!\xdf\xdc\xd8;\xe3hc\x1f\x8b\xd4\x8b\xcc_\xaa?\xfeI |ulZ\xe2-\xc5HT<\v\x1b\xcfT\xb2\xaf\xb8\xb7\xc4<6\xcf\xb3\x8e\xceG\xaa\x12\xc3\xde\x00;\xc0D](\xeb\xb9\xd9iV\xebA\xd2\x92B\xc3\x02\x85C\xf9\xfc\v:\x1c\xbd9\t\xa8\xe6c\xd8\xcb\x8aK\xebe\xfe-\xf9D\x1f\xecq\x95\xd7\x9f\xd7Bs\x14\x88C\x8f\xb6\xebp1\xb1\xdbR\x00\x00\x00\x00\x00\x00\x00\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000), 0x200002de) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000800005d14a4e91ee438", 0x39}], 0x1) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r4, 0x8200) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r5, 0x8200) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = openat$cgroup_procs(r6, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) poll(&(0x7f00000003c0)=[{r2, 0x40}, {r3, 0xc102}, {r7, 0x600}], 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r8 = socket$unix(0x1, 0x800000000005, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) writev(r9, &(0x7f0000000000)=[{&(0x7f00000005c0)="390000001304030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000807005d14a4e91ee4b029cdec040d475d36f7dcfda78a4f87992d73892f19f8f10c32f0c2881007c2dd3c605714036ece70ce89c9941fac985c638f3471a44e16", 0x70}], 0x1) fstatfs(r9, &(0x7f0000000480)=""/162) bind$unix(r8, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r10, 0x4c09, 0x8) listen(r8, 0x0) r11 = socket$unix(0x1, 0x2, 0x0) connect(r11, &(0x7f0000000140)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x80) shutdown(r11, 0x0) recvmmsg(r11, &(0x7f00000013c0), 0x39cd7fadb4b1263, 0x0, 0x0) dup2(r11, r8) sendmsg$unix(r8, &(0x7f0000000200)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x140}, 0x0) sendfile(r0, r1, 0x0, 0x400000000088001) 15:00:29 executing program 3: open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000300)={0x9, 0x6c, 0x1}) pipe(0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f0000002c00)=[{{&(0x7f0000000340)=@tipc=@name={0x1e, 0x2, 0x2, {{0x22, 0x1}, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000900)="0f7a90e72443d7bcbbb4ebd38578cc3abd9c7941395be6fe4caeea438543c8dcc877bd0377d3795e21e35bf9a59ef1f14b5bc243a47e2e71f3948c1137997f1ec83b5e219e69e431107742993a4186a541fef8078386b2048932842ab34684f2a34bc0d21dd62360302c043551bd781c3ab206435568146e2e618f8468c44a18243792142b6e62803346b1c07525308fbacfc8fbe9fd168487a5d5a355a8fff130bc795f7b5845d9001e0040f435cb9ffbe960fc96ca0e3b60beb9cd490ce32e7b472dc8351b6d04310f58c2f0fe4c9a5edbd15552baec89f8569f7bad0d98f448ec77927d0ff2f72e4c0f7950da172297752839b6de32acaab1a73dff8177c4c8d7486131c4567b4e5650aa2133b2ce1616ea511af55ea06731783047f32c50bc36046a965a58cba740d6e45c7b99a37f6d34293817719c6a415a904ad1ebf66d2d217d73eb5fb08c50d725a90ea958c692350ca30a4883ec9df4f6d94aaa104e59890b66d7a0c850521353768ece35fb3a7e974e5090bef99ca5113fcf90f19a986431f2f268c67762fd1eebcc651f3e3b7ab19a0ec06bd648b5ee0e15e352394ac175ed292e34df3030f293cde2bc0d6456141838cd455041fbf835e2786c875cf05777f54da58b84c1e2d0eac2d36ccc6fdbdb8f400e0ecaa80db142aeab21443c57e785912fa391b0684082d83fcbf0b1141b23b83913bb5c824d5f7bf17262515c3c7429f1644adb155856b7bced019ea0a1b56d306519e071714559533d71d92a13bd0a132c8d09885e46cef8986f3fddf4bb2a439a32b3ae66b0bdbd482551417b08a6b3c405acdda08d856599e64ccd1b79bab8c7e67fc0b636bfb9d2567a594f7ac60338d7707a6fa68568adc79ac2664dd5ed773a9699973f6a96acb83ef66ac8aeb2a254954ab030c1db4c5cdc08af20645c5b037334b76aeb2e5a9d5c191b7e40d1e218e2f02f94ba2551325144fc9f2db867635ae33917c08508ce3773ea3b98fe7255764db5adfeb21f8da046c08c647c071a0929a61b02e60afee19b4a3d0f7354c08b1d32e1d1697ae9402654fe0a19d4783505113f7308fb454f2d6c61fdb95714fb50b818ff76dad35ee7274bb089af1e1724223b8532031bc9d4bc0fb99f3fbddbd06fbddfb82f0fc72be50046036acc09b795f73a16e50f01bdede7b2598faaab03887ed25532705f071fadb450656b43ac5e18514e3ce2477e9272f5080f1790a1f46804d5cfbda7944eae1a2e34b108b86d9cf6419fb131311dbf187c2d4d1ff31531e2ea04e1e2770ddb6418f3fde5df1c9b262e086ed94ff40fd1f0ac32281d4361c3b1c090a9ff2364022c6ed70fbc3bd9a5087eda3db71c9c687d0a7bb7d171074dbbc0866586c47bfa929a1766b61c459e984a83bf92382852dbde0438f4f60b3a412185b07ba90aa9e5bc0aae993316340bb33b5e2d4f8332ea49046bc8d2f4fc816d525967663aa74dfa530c3132308586d3cb2bd6dd74f03c0d7100e70ee40ff1ff73f7a463fc1dc86ae7cb8c121d6901fc6b66aeb1762fe9951a3549396e36060797231de0a620c514eb2cf863036f45b784cd9b7c489e199a40819b0216d53f4fdb82e933ffa25b21ef8901e74dbb4247a9e8bb5259c147bc3e3967fe3b958fb1de8e26ec4803b2afe1fc85a4d3ee2b1055235e7fb38f281da0da866ca101c015553bf5c9aec898d62cf3de53031a96073ae9f87aea683b04df527f62c04252d0189da404f289dfb8a1144f10dc9ef974ff7cd04e722d9ce6306216e6dd20eaf5268c6fb39c85addf5139f05fe23a95de7e9eccfaeadb8cfe9ffadd2ded3b853e04805bcc7c3b9a4ea3e8a4e09379044fa5c644a3ff3819a271a0c1de31e3a4147311eb6242f0f857169ba70311cb19f0e00f41e273707188f504fe6ee486e3ea3d91bbacbc900461ca204689ad76324b57c5907fde5f78d9103ce511637a4a19156cf4e62dd24e37b264a4d78749d95b19af3ff8ec9ee119fdc0f8bfc606eb510ed5cdbb985d2b14c5f5cf5e38527b9eb39b7b0d9ea1935c5ae585047728219b6f5d420b3404f494614c399ebeef3ea25dd3cd67bfb7d8b067cde74758d9e953afcf38a695189cec0d97bf1b5901e1030149bb631c6fb72dd7952980f3c6a2db577789acb28b2199cc107eb20d0c2958ce76807e848d31e0076f7c512393fa25877ec130fc174a640d5b35b7d3f6b95f7bbc9df735fa4615067459ab2d4e3a8ab52b8abf9d91d3300927bc077dca2d28d3064914b51dcefc900b92b33d52ec9fa05cb84c8c592d7c368e3714a2f0391f496ae03edfa7d909cc92f33a852fe484a5be2bcb272b5acbe5416f1596ea4d1544eb4969d769e0c0389a7388e679494c52be133b15b409c8e48ad31528c80256b8bd8744ea81f245490f2f3d943f5913c2d07c212e63b67f8953488973bcdfa5680bda8baa4d9e3416fc4f5073fd3f19254606cd091ad9c73968b435039b21933b6a219167ddd4db257496fbb1e8b2c09228360366cf1e982a5c39fc6e1ed7f8feb5f63d3bdba9c174527d20b4ce227e94c3402f471d635dd4e6c3806cb99b350e80f8ac98381c2ab68dbdf6f925c6d2fd20c18f8115b2e82a5585354927c33a078579fded39780392200e9a2867bf54b442bae69963fc2035816b74edd2306b3d6c56a3281957cc7713bc254f272e3e9fa4375d7a79f57df1707386b4897e8a4aea622a0340cecb6ba720a0f83afec1272f4e8b5acfc1f75ce09d845300692a5c94a086ac873dfecde2f8b79b0cb340e8736943d4eee3bc668f98dcb4c78ab0d853505a81a63dc6bb6e64ac03bed6f5115df2075df8855199bad3d79a4c5958c9643ff36cea33d68831287b3beeec2f680826b9ef93f19ad0f5d2ce4e2d87665b0d35d4a5fa2b797daf60b02590ba465541c02b4130700a0eaef03b0ff2707f52612b00e71fcdcb2bbc2e1b59560c4b0446278ec4352429c276a916f7db29c81cb883defe3942897d54d579fceb031ab191312c890ed3441411d31ba651c08dcb35c13f73cb43048fb2d38e07e8f8b8e9ff9d53ba727d6527adcb901c0987aafb3c9c6c58c18ffbf24b1ca0d4ef1433b5d5a9ffbbd771d8f228ae9d6a2663d2c8704403a929cc5102ee93dad6409f098615e02ddfd904738d05f69ba8d52bfcaac9b249eaaef7af4f59ca1e0c994b306f031e7786dc7223082a83fa9651d41ae05bc6ca713db9beeb0c43ba50e399ab16dd9f55a875b317615b4750443e45a5edef4c103be1d93aa9ff32670ea7404936d82f64385b79b5ccc638d46d0435225230cd6a78e06486075efe64394e0c95c6592e341ac0e70733e0f132b77ae948b626d88e6b9810499d58715affaa9bbbf052bceaad1dd16ce6b7514498d3e402cfa8ce6c0732d04796913187eac9d054510c65095cd72918ea52323f47a31d0638e1ab358bd69d33f2e5a3c4b5e3db85cabccc1d810aa9b951788166c898291bb82fd2973933db04f800c3d604297b18158257dd66a54902d26d6281ad07abdc76ddb8084637a67b87492a46c3d614cba1e1262dc3e02be920c3df7ea88a23961ad12d21b855a7deca28cb7c359513fb4a2fe7209a3234159e889097bab90df540b7644cdde57380fa5a13e25cf77e2d19573221ff1e9e3fca42dce62e9858189c8732b10b7622352331733c9344f9477f44372b63fe31fd41db3598b192a6d6fa054c9b1e4e976f385c5c2d20a4aa5151dce0c7225d33e13e7027c0888610f7c9262662e5d9964f1c476776d4521a3a4390d3109d773ddff587cc417a5a4822b67c0c4c282aa254d4196e8b9554ee214d5f706f6bafff5faa9bfc9aa0dfabf83d4e9acb56c494260e26f17d52cbb2dbacea5b5ba50c78ef16cc1c6a28c5b7474dd7c1cba8aaaad9b5a5fb6a69a6bf94db1331727bc39cce2852d947504a810f083e4e7fee52dc1e343c63b46dbcbed96bc4d1e9f92a2d9a0779c535a29867db6b8e32914966843703316366d85ac3940a20e44325e1590085f0f5bbb888f429f6cba01dcff7cdee989561e87f7ac9c71cbafeb98d7d992a60a72c0a8d675edaa3460fa9691cbc1c0a8495857c4a3ebdb3995af510d266f8cb7fada06c664997419dec1ba9fb98dce071d73567c8cf47cff88b5fbd5e8e6316541cd57a0a746c6a11fb4cf001fe453df4ec059086f00e7ce5b1270d1031d635c64b25067e9da44826eedb087bf99db81cf6fc453b9b9c4afa3948e928317bdd5f6b895136cd82837b57638e76540f8047530633f8190953b3e01ea2d1c2942ce7e5430d86adf8768748bd4918f78fb3cc178f2a2ccf4cccd45cd08a970c2d96b5a32c4c97d877083d5b0a1cd42e269bca50ca5f1eb17d5ec36c9837936957a566b2116d83373a71c2282a7bcb5de04ab037b892cc53960b1df863fefbe0eeb177130973a311e4994adcb70e355b64522b23619fa162a90a8b66a9dc9e325aa49a1c503f89407e7417e638db83526052de620a97eb9362ee74beec39473a631fbd5806cec0e16cce02aa96d5df93b2948990af197451f4b1a23c5f4a21ff3f20728d9d98375cea14c880d076a47f6a3291f46bc9b0d0ee8128ed10383b5c380ddfdc7e82563264c3705c1e227f784dc345d53fdb6b701113568bf4dacc554a964d88ce617b1bcf8660ff0948452697ae9b737a98fca8fa57e6f6b36c4977a12ab067b76fd5240d9b67a0b2941ebe1b548832f5f8ff7285616499011695c445f2b734788f1765fe541f8e1443e16d1efda1d01cb72d18134da335a4ee1799863324f7870314db5cd4599ce6b6da19142b152c81c6317c7ca86a33d6e13bd062de1861c6fa077cce383c1cb01060d5368c0800f4aa031d4b9e585b0b193484d751489a1a928b148a2e8f918ee30735d2f880a5d8819787fe27cdbb37136e0af35ac0931e16784ff53ac14ba67b063d09c4b6f809e8d6f410846fbe90a2dc9d4ae9e03160d21348118c6e43970cd1183daae5154347529e015d4ecf1a7db1e38ea2df1b504950d8da230ea27bf5d911923e82521954528a97b537870d19791c5b5df9c179f935a1f02146c2ff2f66e62fbe21acacf30a726e08d4af89dbc59a9c7abf11842bc682f500b8c727776ba4448c46be6771a921b8b2343e31e606769a06e2e4dea264258f9a96607ebce6a74d524bb421b3d260a7303029267ec307b0c9ce4179189ea984ba047450ab10616b2d2ee2c0e4ab84da91a4d5534479b77b9c3f196e78e13d8f0ec783d6d77715cf8888002ce7e6211fa727f38f89c4f5e74a0b89187b927c21480485c96d6fd25c1f7d2233bf79225980a16a2744ae61e2a4e0063893295468276aa79914f43df0294ceac94b657537854a5a7ddf463437fa02ece30328bf6d0407e4a4fa11637818328f35c59b458a7c606dec9df5183105cc20eb50b13c9e603507fdb199e34fed51658a2aca2322180f57fb3a8c9ff40f9a9f2f03256e35df65f3d10953135de250ffedf09cd7954c8cada2f3cdb53a92151420e38d79a718b23d86770d9d2435795d7dda4a5f7d75904acdc83488d1feb90224f7d8e0fb0ed1e3be453cde5b38fcc339788b230be953058be56f55532361a772d849aad8fa20b81834b198b41c6d5bd09b90f58b33446b71ee71fd48f47f100441c242f579440ea96aa2d821fc778d4f4af70f248c7bdb67053dd2b17480441d3a3c475a969c517a881ae4eeeaa4d5b13cb174f3c18376c1ce99cc8f38c3677c5460efa4c617d83e8515192cb7a0da6d7b8b27e63abf3ff8130405bd39ac51a5ae1490", 0x1000}], 0x1}}, {{&(0x7f0000000680)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000000500)=[{&(0x7f0000001900)="dcaf905ca663cc53c94ad924dee681a127cc83af7f7182ece2b53cfea0483ec976fba4ee08a37b0560f4bde52e68726d252edea0bf57009368fb1df6f357b27c3a80c338907934ae6446f2ab66f62e6946e8d0be5abe84e0d9591b4a80effffb8024c4b17b7df789b4e299e1c9181bf9025d", 0x72}, {&(0x7f0000001980)="9f1eaa4b9e97014bfe34c01f8f2193c3285795be4f93a9a1c4d7a16a7326a26b8c6d7152a2ef3ef0a6eef47cc92800cb867766a9ffdf574129c9be17d9fe6bef95f44095802d03134d93794182bb44594d", 0x51}, {&(0x7f0000001a00)="541839f04e63767f97cbb9a762027bfc643841b95500f7ad6febc089ad68e661243b5be0111ed06e1121b6f04a9754bda3bdee36693216ade92bb5b9da9d173f0d1a19e7fe9d13aa62faebd985aa008ac44cc608e20f400e2bd368547a82e665fbe8cb3365e48453", 0x68}], 0x3}}, {{&(0x7f0000001a80)=@llc={0x1a, 0x309, 0x8, 0x7, 0x1, 0x80}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001b00)}, {&(0x7f0000001b40)="cb05d3a273e092da691b9d9e254dc4906412973dbba91a37718bd790ccb071536f4aacc446f8ad02aca594a01b0f4abfc9acbc", 0x33}], 0x2, &(0x7f0000002c80)}}], 0x3, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='\xde\xff\xff\xff\xff\xff\xff\xff\b\x00', 0x99639703e12f9a79, 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x420a82, 0x0) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000180)) setxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./bus\x00', 0x6, 0x1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 15:00:29 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:29 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276", 0xc1) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:29 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000080)={0x10001, 0x8000, 0x8, 0x1, 0x6, 0x20}) fchdir(r0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x202000) r2 = dup(0xffffffffffffffff) openat$cgroup_type(r2, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) inotify_init() fcntl$setstatus(r3, 0x4, 0x6100) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) rt_sigaction(0x26, 0x0, &(0x7f0000000400)={&(0x7f0000000380)="646526f082610a07824c2d2104c017da6426f33e0f18810d0000000f4bd2660f2cd7c000fbc4e14758c026d133c4c1a9def9", {}, 0x0, &(0x7f00000003c0)="f30fbdf4660f382262bdc4c2f902e2c4e27597a2b191911e0fc70c9ad87fc6670ff7d8c4e1edeb499fc4c28139b4f3feefffff8fc858ec54280032"}, 0x8, &(0x7f0000000480)) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r6 = open(&(0x7f0000000000)='./bus\x00', 0x10000, 0x2) r7 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r7, 0x80084503, &(0x7f0000001100)=""/4096) r8 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r9 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r9, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r8, r9, 0x0, 0x20000102000004) lseek(r9, 0x0, 0x4) sendfile(r3, r6, &(0x7f0000000040), 0x8000fffffffe) ioctl(0xffffffffffffffff, 0x0, 0x0) r10 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r10, 0x2081fc) ioctl$UI_END_FF_UPLOAD(r10, 0x406055c9, &(0x7f0000000300)={0x3, 0x7, {0xac, 0x7fff, 0x1f, {0x7fff, 0xfffa}, {0x84, 0x8800}, @ramp={0x5bcb, 0x800, {0x0, 0x3, 0x3, 0x4}}}, {0x54, 0x1000, 0x4, {0x101, 0xda0f}, {0xe132, 0x5}, @rumble={0x1, 0x5}}}) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x10000) sendfile(r3, r6, 0x0, 0xa5cc554) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f00000004c0)=""/191, &(0x7f0000000580)=0xbf) 15:00:29 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b", 0xc3) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 975.931378] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 975.941464] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 975.989137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1043 sclass=netlink_route_socket 15:00:29 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0)={0x1f}, 0x8) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r0 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r1 = epoll_create(0x96b) sendfile(r1, r0, 0x0, 0x20000102000004) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/mcfilter\x00') ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000040)=0x5) preadv(r3, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 15:00:29 executing program 3: signalfd(0xffffffffffffffff, &(0x7f00000000c0)={0x1f}, 0x8) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r0 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) r1 = epoll_create(0x96b) sendfile(r1, r0, 0x0, 0x20000102000004) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/mcfilter\x00') ioctl$BLKFRASET(r3, 0x1264, &(0x7f0000000040)=0x5) preadv(r3, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 15:00:29 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:29 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)=',md5sumbdev+vmnet0.+]nodevmime_typesecurity,\\\x00', 0x0) mknod$loop(&(0x7f0000000180)='./file1\x00', 0x1058, 0x1) write$binfmt_script(r0, &(0x7f0000000280)={'#! ', './file1', [{0x20, '#! '}]}, 0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e24, 0x3, @remote, 0x8001}, {0xa, 0x4e20, 0x3, @remote, 0x10000}, 0x4, [0x8, 0x658, 0x0, 0x0, 0xffff, 0x3, 0xffff, 0xebb]}, 0x5c) 15:00:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) bind$netlink(r0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffffffffffffb) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000040)=0x140) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000780)='./bus\x00', 0xfffffffffffffffe) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) sendfile(r4, r5, 0x0, 0x8000fffffffe) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) getgroups(0x0, 0x0) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x200) preadv(r6, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000080)}) 15:00:30 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b", 0xc3) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:31 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00zJ\xf9\x7fE^0\xed7\x9a\xef\xf8\xc2^\rMq\xdc\\\x1eR^B\xcc\xc34k\x01\x8b\xeb\xf7\xc0Z~.\xb2\x1b-Z\x94\xe1\xcd{\x90\x01\xeb\xef\x1dm\xa6\b[\xe4=^\xa3\nR\xeb\x8coV74\x80g\x06\xe1\xd3\xeev\xb9\xef\xd1;\x96\x9bj\x9c-\xd5 \xad\xd5\xc6\x96\xaf3\xd1qG\x9f\x05\xfe\x92\xc8\xc4\xed\xa18\x90\xa0\xac\xfe\xaf\xda\x1bS\xcf\xc1\x9e\x81}F\xcc\x85W\xc9\\\xe8\xe0\xe2\x19!^JP\x19}R\xd8\xf5\x88\xf6\x9c\x82\x9c\xec\xce\xe390\'#\x9a\xad\x96\r\x02`d\xaa\n?%\xbe\xa4X\xd5P\xdc\xe0\xaa\x8c&\xc8O&\x1d\x17\xd8AyaM\x00\x00mh\x8e!\xdf\xdc\xd8;\xe3hc\x1f\x8b\xd4\x8b\xcc_\xaa?\xfeI |ulZ\xe2-\xc5HT<\v\x1b\xcfT\xb2\xaf\xb8\xb7\xc4<6\xcf\xb3\x8e\xceG\xaa\x12\xc3\xde\x00;\xc0D](\xeb\xb9\xd9iV\xebA\xd2\x92B\xc3\x02\x85C\xf9\xfc\v:\x1c\xbd9\t\xa8\xe6c\xd8\xcb\x8aK\xebe\xfe-\xf9D\x1f\xecq\x95\xd7\x9f\xd7Bs\x14\x88C\x8f\xb6\xebp1\xb1\xdbR\x00\x00\x00\x00\x00\x00\x00\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000), 0x200002de) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000800005d14a4e91ee438", 0x39}], 0x1) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r4, 0x8200) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r5, 0x8200) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = openat$cgroup_procs(r6, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) poll(&(0x7f00000003c0)=[{r2, 0x40}, {r3, 0xc102}, {r7, 0x600}], 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r8 = socket$unix(0x1, 0x800000000005, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) writev(r9, &(0x7f0000000000)=[{&(0x7f00000005c0)="390000001304030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000807005d14a4e91ee4b029cdec040d475d36f7dcfda78a4f87992d73892f19f8f10c32f0c2881007c2dd3c605714036ece70ce89c9941fac985c638f3471a44e16", 0x70}], 0x1) fstatfs(r9, &(0x7f0000000480)=""/162) bind$unix(r8, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r10, 0x4c09, 0x8) listen(r8, 0x0) r11 = socket$unix(0x1, 0x2, 0x0) connect(r11, &(0x7f0000000140)=@un=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x80) shutdown(r11, 0x0) recvmmsg(r11, &(0x7f00000013c0), 0x39cd7fadb4b1263, 0x0, 0x0) dup2(r11, r8) sendmsg$unix(r8, &(0x7f0000000200)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x140}, 0x0) sendfile(r0, r1, 0x0, 0x400000000088001) 15:00:31 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x20141042, 0x0) r2 = inotify_init1(0x80800) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2840c0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffeb0) epoll_pwait(r1, &(0x7f0000000380), 0x65, 0x3f, 0x0, 0xffffffffffffff37) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000300)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="9ecdc794735a5f7515e1bf39b30c565cc1df502f776fe73d0d9f933b170dd59c917c47498bda022283bde2976b80021015f87f14ce61baa1ed6d4a4e0ef85aebb84a2dd734f5fc8ddf6272255fbe1f96890537309afdc86234a8666c68070000000000000030efaf4afdd54d7615e5adf983e9df09d127f3625b8c38e799feb8532f927db380d57fd2a9ecc8f0ae0472b6eb50e8"], 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8000000003) remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xdff, 0x10000) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000940)=""/4096, 0x1000}, {0x0}], 0x2, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup.net/syz1\x00', 0x200002, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000001a40)=ANY=[@ANYBLOB="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"/373], 0x175) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendfile(r3, r4, 0x0, 0x5a92) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f00000001c0)) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) sendfile(r4, r4, &(0x7f00000000c0), 0xbf99) 15:00:31 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:31 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276", 0xc1) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) bind$netlink(r0, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffffffffffffb) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000040)=0x140) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000780)='./bus\x00', 0xfffffffffffffffe) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) sendfile(r4, r5, 0x0, 0x8000fffffffe) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) getgroups(0x0, 0x0) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x200) preadv(r6, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r6, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000080)}) 15:00:31 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 978.270759] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 978.280080] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. [ 978.304922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1043 sclass=netlink_route_socket 15:00:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @rand_addr="0000614b8ef33b895d963800004f2e00", 0xde5}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000240), 0x8) listen(r0, 0x80) flistxattr(r0, &(0x7f0000000a80)=""/114, 0x72) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='\xe9k\xc0\xa1\xddreno\x00', 0xa) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xffffffffffffff46, 0x20000004, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) r3 = gettid() timer_create(0x5, &(0x7f0000000040)={0x0, 0x14, 0x0, @thr={&(0x7f0000000c80)="1a64aaaf3bbff09fc79ce34f878ddf5a7be74557e2c66f51a02007e878dff3849260d1813b662e81b8d37a1170da4a837cd8fab9157902c6feeddeb38ddfd67a76cb4fd7f7754b599aa043c5759be5b066ac2abba642322e94b8c53794854fb90efa17b9a97a236642296ae99f699eddfeedddf99535d87ad95cf9cb5afb09679c5a92c6ff1b8899c941c0aa3e4686c8a76cbb0ef94db6e083c8cbe5717909fbe0307f4b166d3de667e32ed570e018f763dde5201cb236710e19d0a9214f29b3dab2c7114ca201beb7d65ee7d18e13f8d69135ce0a83257fcada4b3c7d5afcb158c834e524f983006c5d08cee7deeee738506086ec9601c177737aad0e6d5c77408244238850ae22d95e32a04937179a0a0bdba3d9d8b30305be8c737f179387c2429688158fb7bf0bff7f00007759b2c577e1b07f062787cbd0b6655a2f28f03338c6ceb90316811e5055866e48", &(0x7f0000000e00)="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"}}, &(0x7f0000000140)) r4 = syz_open_procfs(r3, &(0x7f0000000200)='net/hci\x00') ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000280)={0x5, 0x0, 0x3}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000640)={'icmp6\x00'}, &(0x7f0000000680)=0x1e) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) write(r2, &(0x7f00000004c0)="33badc1cfb0db1337a97b52b4cb547b271f91ca32a", 0x100000020) recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0x1f, 0x20, &(0x7f0000001880)={0xa, 0x0, 0x6}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000780)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000180)=@sha1={0x1, "c3c3bdb3df0200c09525aa0573ab490c3ac43bdc"}, 0x98, 0x1) ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}, {0x2, 0x4e24, @local}, {0x2, 0x4e24, @multicast2}, 0x90, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)='veth0\x00', 0x800000000000, 0x200, 0x8000}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet(0x2, 0x4, 0xc1) accept4(r0, 0x0, 0x0, 0x0) 15:00:32 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:32 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f0000001100)=""/4096) ftruncate(r3, 0x6) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 15:00:32 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(0xffffffffffffffff, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:32 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r2, r2, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000240)=0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000100)=0x80000001) r4 = getpid() waitid(0x3, r4, &(0x7f00000004c0), 0x2, &(0x7f0000000440)) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000003280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$NBD_CMD_STATUS(r5, &(0x7f00000033c0)={&(0x7f00000032c0)={0x10, 0x0, 0x0, 0x41000400}, 0xc, &(0x7f0000003380)={&(0x7f0000000540)=ANY=[@ANYBLOB="ffd14c54ff0300000f8c96266575be62122b4e5b5c63a9aa1bcee9cbf1525e005d7ae45845695e7b31b4e8d9521aa6f8", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fedbdf25050000000c00080001000000000000000c00050040000000000000000c00050004000000000000000c00080088060000000000000800010000000000"], 0x4c}}, 0x8000) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0)=r3) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r6, r6, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r7, &(0x7f0000000380), 0x8, &(0x7f0000000440)) waitid(0x0, r7, &(0x7f0000000280), 0x1, &(0x7f0000000300)) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f038b0503000800080005000400ff7e", 0x24}], 0x1}, 0x0) 15:00:32 executing program 3: r0 = socket$inet6(0xa, 0x100800000000002, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00zJ\xf9\x7fE^0\xed7\x9a\xef\xf8\xc2^\rMq\xdc\\\x1eR^B\xcc\xc34k\x01\x8b\xeb\xf7\xc0Z~.\xb2\x1b-Z\x94\xe1\xcd{\x90\x01\xeb\xef\x1dm\xa6\b[\xe4=^\xa3\nR\xeb\x8coV74\x80g\x06\xe1\xd3\xeev\xb9\xef\xd1;\x96\x9bj\x9c-\xd5 \xad\xd5\xc6\x96\xaf3\xd1qG\x9f\x05\xfe\x92\xc8\xc4\xed\xa18\x90\xa0\xac\xfe\xaf\xda\x1bS\xcf\xc1\x9e\x81}F\xcc\x85W\xc9\\\xe8\xe0\xe2\x19!^JP\x19}R\xd8\xf5\x88\xf6\x9c\x82\x9c\xec\xce\xe390\'#\x9a\xad\x96\r\x02`d\xaa\n?%\xbe\xa4X\xd5P\xdc\xe0\xaa\x8c&\xc8O&\x1d\x17\xd8AyaM\x00\x00mh\x8e!\xdf\xdc\xd8;\xe3hc\x1f\x8b\xd4\x8b\xcc_\xaa?\xfeI |ulZ\xe2-\xc5HT<\v\x1b\xcfT\xb2\xaf\xb8\xb7\xc4<6\xcf\xb3\x8e\xceG\xaa\x12\xc3\xde\x00;\xc0D](\xeb\xb9\xd9iV\xebA\xd2\x92B\xc3\x02\x85C\xf9\xfc\v:\x1c\xbd9\t\xa8\xe6c\xd8\xcb\x8aK\xebe\xfe-\xf9D\x1f\xecq\x95\xd7\x9f\xd7Bs\x14\x88C\x8f\xb6\xebp1\xb1\xdbR\x00\x00\x00\x00\x00\x00\x00\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000800005d14a4e91ee438", 0x39}], 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000800005d14a4e91ee438", 0x39}], 0x1) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r4, 0x8200) r5 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r5, 0x8200) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = openat$cgroup_procs(r6, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) poll(&(0x7f00000003c0)=[{r2, 0x40}, {r3, 0xc102}, {r7, 0x600}], 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) r8 = socket$unix(0x1, 0x800000000005, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) writev(r9, &(0x7f0000000000)=[{&(0x7f0000000300)="390000001300030468fe0704000000000000ff3f06000000450001070000001419001a0015000a00050008000500000800005d14a4e91ee438", 0x39}], 0x1) syz_open_dev$sndtimer(&(0x7f0000000400)='/dev/snd/timer\x00', 0x0, 0x4001) fstatfs(0xffffffffffffffff, &(0x7f0000000780)=""/172) bind$unix(r8, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r10, 0x4c09, 0x8) listen(r8, 0x0) r11 = socket$unix(0x1, 0x5, 0x0) connect(r11, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) shutdown(r11, 0x0) recvmmsg(r11, &(0x7f00000013c0), 0x39cd7fadb4b1263, 0x0, 0x0) dup2(r11, r8) sendmsg$unix(r8, &(0x7f0000000200)={&(0x7f0000000080)=@file={0x1, './bus/file0\x00'}, 0x6e, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x140}, 0x28004014) sendfile(r0, r1, 0x0, 0x400000000088001) [ 979.280770] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 979.298995] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 979.319840] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 979.328373] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 979.361113] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. [ 979.378818] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.3'. 15:00:34 executing program 1: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000100)={0x0, 0x0, 0x80000001}, 0xc) ioctl$sock_SIOCDELDLCI(r0, 0x8981, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffe3c) request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='-(%vmnet0\x00', 0xfffffffffffffffe) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r4, 0x0) ioctl$UI_SET_LEDBIT(r4, 0x40045569, 0xb) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) bind(r5, &(0x7f0000000300)=@nfc_llcp={0x27, 0x1, 0x0, 0x5, 0x2, 0x80, "5b907f21ace3edb3507bf7e44e8e557e184d056585fdc0a1d923de29a8af1226f0e345ccaae4dc52d54a0036486dd5cf67f40de7c0709a1488f1815210fb4c", 0x14}, 0x80) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000a40)=0x4) write$tun(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="0000000000000000000003000000490000b10066003f80169078ffffffffac14140044200130c11414aa000000040000040000f8ff0900000000000000070000000300831f01000000007f000001e0000002000000007f00000100000006ffffffff890f097f00000100000000ac1414aa004e244e20", @ANYBLOB="601900059078fff9fe04f9890bd2a61ae2afbb1e2d8b012191c09d7d2a699ece16719f577ad074c54b48b98c201f08dd291b4c9b276313c074b9ebddae10527d0a5bc5cf354bfd1db3e1a78bc5779d83ccab96a01d8454176ca33709278edb84caa4491a1ee2dd1f17a4025eb126463a82b411a2dd9b8ae1b0282b52da1f72e6bb831968301642842669ddf2673950cad41a42ade5d175f211f12795e107af86f89e7f379fb74645da9c85007e1f866c9609d63c0b9cc4e1df289102258eb0f18ff4bcd8eff285610371d89412127649778180a9d2b9ef65b07b55e2a2b051457c6e66dc618f77800c613348d0069baf8f72dd8f1b2b516c1a696fef034a6494987fcd061bd6f2dcb0f6694595251788bddfcd10a445fd4ca0874737f570d06ea7656a3e5a39cb2b916c6b2a5c5342f5f568780a02c84bf019d4eef80ae1ebdfced95890c2b7c7e4ddca411789b66e9310f61a570041873d3a183f2790c5a21d0ff2037c421ab9162cbac4e4aff4a516be4d70abdf7a2169e6de2b5234dd1c6d59f617328bcbca2a95a8980f73f2e298ec52bd3e91ee2b05095fa4e39b64bbadbf4fe2325499ddfb26e6677b1bf222e5962c6ea5ed02afa802266a1eb748919bf94017102831e6112cf10e"], 0x2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) 15:00:34 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:34 executing program 0: syz_genetlink_get_family_id$tipc(0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x5f, 0x0) set_tid_address(0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0xc860e17cbf55624f, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) write$smack_current(r0, &(0x7f0000000240)='TIPC\x00', 0x5) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000140)="9e6578ad80f0058743fbb2351fbeeecbf88ef30ad722f85f4fc6d45f77ce543959e7959e597ca56b39c70ae7edfcb1bf0575b83ed81376dbd55dc107ef9d442ac1ecffbd7b2ba8bde2e5dd3d370d380e11ef01e21fe33e87036b5bc7d8da79bf0276a43893d175dda7e7dcf18d711a86c98fe9de7eea88b725e53d8a572c37411462c837a9c6a5f0929a1ca20d92886224c62fbba378ffbf91fe366fb8e7eb4bcc8d74afd10202dd72c9735a054d171b5fe1ccc1f861dd8492d2b3fa62522b2f89fbebd29618745274cd7706644c45dcc58559d6f50f9d43b0b5600afb8b603e25e58e670ce78d5e4a44a7745228cdc61f60f8a0f52411156d97a859826e8226") recvmmsg(r2, &(0x7f0000000240), 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r3+30000000}) 15:00:34 executing program 3: r0 = socket(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x50, &(0x7f0000000180)=""/8, &(0x7f0000000140)=0x8) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000100)={0x3, 0x200, 0x7fff, 0x3, 0x16, 0xe1, 0x2, 0x9, 0x950c, 0x3a, 0x2, 0x5}) chdir(&(0x7f00000002c0)='./bus\x00') r3 = socket$inet(0x2, 0x80000, 0x81) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r4, r4, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r5, &(0x7f0000000380), 0x8, &(0x7f0000000440)) capget(&(0x7f0000000000)={0x67e7d5ef032aef0, r5}, &(0x7f0000000240)={0xa68e, 0x8000, 0x9, 0x9f7, 0x6, 0xfb}) write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) 15:00:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300001600000000030005000000000000fbbb5b910000003f0000000000000005000600000000000a0000000000000000004000000000000000000000000000000000000000000004000400000000000000000000000000000000000000000000000000000000080200010000000000000000000000000005000500000000000a00000000000000fe80000000000000000000008cdab59fad43683e646667000000ff00000000000000000000000000000000fa97cc82494dcfdeab2185f553aa72e9bfd9f74796db46a141b04ffc483315254129ddee036d35bc056d7dbb9e7ee58b5f57710558dea09ddc5b00f85aedac7cae81c944249a5a5ac60e38b43f712991bc724e2b7aac35442ccc"], 0xb0}}, 0x0) 15:00:34 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(0xffffffffffffffff, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) fcntl$setflags(r2, 0x2, 0x1) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000380)={0xe10b, 0x37d, 0xb2, 0x8, 0xb, 0x6f, 0x5, 0x1, 0x76ce02ea}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) openat(0xffffffffffffffff, 0x0, 0x2000, 0xe0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e5e2) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f00000001c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4000000004e24, @local}, 0x10) connect$inet(r5, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r2, 0x0, 0x2) sendfile(r2, r6, &(0x7f0000000040), 0x8000fffffffe) lgetxattr(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000400)=@random={'security.', 'eth1\x00'}, &(0x7f0000000480)=""/167, 0xa7) socket$inet6(0xa, 0x80004, 0x0) sendfile(r2, r6, 0x0, 0xa5cc554) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r8, r8, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r8, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r9, &(0x7f0000000380), 0x8, &(0x7f0000000440)) sched_setattr(r9, &(0x7f0000000540)={0x30, 0x1, 0x0, 0x5, 0x6, 0x0, 0x1, 0x7f}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000940)) 15:00:34 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x16) connect(r0, &(0x7f0000000000)=@x25={0x9, @null=' \x00'}, 0x234) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="390000001300090417feb1ae7aa77cf40000ff3f0200000000000000000010141900040043010433b667d94fbb1039a5c100000a15005d14a4", 0x39}], 0x1) 15:00:34 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) splice(r0, &(0x7f0000000400), r0, &(0x7f0000000440), 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r0) r3 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000004c0)={@ipv4={[], [], @loopback}, 0x71}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000240)={0x0, 0x7f, 0x7, 0x0, 0x11, 0x3, 0xc0000000000000, 0x7fff00000000, 0x3}) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r3, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r4 = getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r4) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') fsync(r3) write$P9_RSTATu(r3, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x3, 0x80000001, {0x56, 0x2, 0xfffffffffffffc00, {0xf6, 0x2a}, {0x4, 0x5}, @period={0x58, 0x100, 0x3f, 0x9, 0x7ff, {0x94bc, 0x2, 0x5, 0x1f}, 0x0, 0x0}}, {0x53, 0x100000001, 0x6, {0xa22}, {0x6c8, 0x401}, @ramp={0xf38, 0x3, {0x80, 0x0, 0x0, 0x8}}}}) r5 = socket$key(0xf, 0x3, 0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0x6, &(0x7f0000000100)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x2, @dev, 0x5}, 0x1c) r7 = dup2(r6, r6) setsockopt$inet_int(r7, 0x0, 0x32, &(0x7f00000001c0)=0x1000000, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/368], &(0x7f0000000040)=0xa3) ioctl$int_in(r2, 0x0, &(0x7f00000001c0)) write$binfmt_script(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, r5, 0x0) 15:00:35 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(0xffffffffffffffff, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:35 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x20000000805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x5], [], [0x0, 0x7]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) r1 = open(&(0x7f0000000940)='./bus\x00', 0x141042, 0x8) pipe(&(0x7f0000000180)={0xffffffffffffffff}) read(r2, &(0x7f0000000000)=""/250, 0x128b9372) mknod$loop(&(0x7f0000000100)='./bus\x00', 0x0, 0x1) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x11) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x27) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x10) [ 981.757705] input: syz1 as /devices/virtual/input/input57 15:00:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x200000000001f6) r2 = gettid() sendmsg$nl_netfilter(r1, &(0x7f0000000340)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000e80)={0x294, 0xb, 0x6eb25a48e869dee5, 0x4, 0x70bd2a, 0x25dfdbfd, {0xeba447f0c0fb821, 0x0, 0x6}, [@typed={0x3c, 0x32, @binary="05a0c5abe47f4f987988e5bd32aee7074ea0dd15cddbebb22bc38213dbddce57763e40750858688af54ece940a0de384d77862e2ecdb"}, @generic="19b674ee7191c9e0cf3103b6a422942f1579bd9a4a2ab5e2ed14f29f590f814f2e352981ec1b219cfb38875728f11f77166eb1040373bb71f894e47460b42bdb73526a1d3cd8a0911715487a8921b0e975471884", @generic="790a5479ba42285b8178d66d33b70b8108ab725eda98cee3f385e4bc678ba1aa9470c19e2202add9c8dea33d288cffeb6a2333e465f43a45ebfd60dae4a9728f866f53de237ddce6a24ea6a939f8a71c4a081186ee728bfb923d7f266e64d63d9fd8d5c45603c791000308dfb3e1ad47734cff7685ebc7d87838fe806e41855305c36857b9c8dbb815d84173ffd08019559cde3a", @generic="f762731503b1ae10b459f4e0f2195c07d3377a14cb2e696fc33bf4eb7e91d7f50ce19a8bb3897d621c089cd2c92cab2c59d0c7619f39ee41e4593d6c1c293705099ee99b586c84d630d26fe50a9631c3b9dd1b4558c0c20d252e25cfdfa8f37476f298e579ff269254d89482dd178d044d3dae5ec0d0054ee8c8fe1e8c20b0dd5701", @generic="9eb39cf8de836eadcf64dfea960c60e1dad5d20dba7227206cb43951b3673edf63b3713f8202f7585bda2a874cfc75279b0318f3f038", @typed={0x8, 0x47, @pid=r2}, @generic="4db5e65cad03b964912fe7aed7dff3700fa624902ead1a0fecbb107f8c7960dcb42c204a72bf360b5531c4a2be467eb2b8f9b83ebfd467e7c33a778f45d5276a2db505a4ef729aaebbe39110454e5302b69437d0b64139f592401728a366d60ae210c39da1ab4835e1b367bcce48b6497c43a5e2b685934d20f59084375239f715ea31cc20fc76363bdb4c6f12e4ed63ffbcb907acaf4f65a346e4"]}, 0x294}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f00000001c0)=0x1) fchdir(r3) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x4001) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)=0x0) fgetxattr(r4, &(0x7f0000000100)=@random={'os2.', 'keyring/.\'-\x00'}, &(0x7f0000000240)=""/172, 0xac) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000840)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRES64=r5, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES16=r4, @ANYRES32=r3, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESHEX=r3, @ANYRES64=r4], @ANYRESOCT=r6, @ANYBLOB="282805eeabf8bfe484600f70d69b58db25", @ANYPTR64, @ANYRES32=r4, @ANYRES16=r4], @ANYBLOB="2388c6cb4242f5740b", @ANYRES64=r3]) syz_open_procfs(r5, &(0x7f0000000380)='syscall\x00') write$binfmt_elf32(r0, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x778) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x9a6}], 0x1, 0x0, 0x187}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e24, @empty}, {0x2, 0x4e24, @loopback}, 0x1, 0x0, 0x0, 0x0, 0xcb7e, &(0x7f0000000000)='nlmon0\x00', 0x2f, 0x9, 0x99ed}) r7 = dup(r0) creat(&(0x7f0000000280)='./file0\x00', 0x4) sendmsg$nl_netfilter(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x9a6}}, 0x0) 15:00:35 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001080)='net/tcp6\x00') read$FUSE(r0, &(0x7f0000000000), 0x1000) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) timer_create(0x4, &(0x7f0000000400)={0x0, 0x20, 0x0, @thr={&(0x7f0000000340)="96fcdbd2a1d95cb3fbb73db0a9cc41", &(0x7f0000000380)="be3176118f7d8894daf20486cda26e51486a693e7e04edd030374dd4df7640a0ef5b60a74064fa0ebc78f2721973f233ae6d59de41"}}, &(0x7f0000000440)) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) inotify_init() clone(0x100020040004101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000640)) wait4(0x0, 0x0, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r6 = open(&(0x7f0000000940)='./bus\x00', 0x141042, 0x8) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r6, 0x27) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f00000001c0), 0xfffffef3) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffffffffffe39}], 0x0, 0x0) fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) 15:00:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x200000000001f6) r2 = gettid() sendmsg$nl_netfilter(r1, &(0x7f0000000340)={&(0x7f00000002c0), 0xc, &(0x7f0000000300)={&(0x7f0000000e80)={0x294, 0xb, 0x6eb25a48e869dee5, 0x4, 0x70bd2a, 0x25dfdbfd, {0xeba447f0c0fb821, 0x0, 0x6}, [@typed={0x3c, 0x32, @binary="05a0c5abe47f4f987988e5bd32aee7074ea0dd15cddbebb22bc38213dbddce57763e40750858688af54ece940a0de384d77862e2ecdb"}, @generic="19b674ee7191c9e0cf3103b6a422942f1579bd9a4a2ab5e2ed14f29f590f814f2e352981ec1b219cfb38875728f11f77166eb1040373bb71f894e47460b42bdb73526a1d3cd8a0911715487a8921b0e975471884", @generic="790a5479ba42285b8178d66d33b70b8108ab725eda98cee3f385e4bc678ba1aa9470c19e2202add9c8dea33d288cffeb6a2333e465f43a45ebfd60dae4a9728f866f53de237ddce6a24ea6a939f8a71c4a081186ee728bfb923d7f266e64d63d9fd8d5c45603c791000308dfb3e1ad47734cff7685ebc7d87838fe806e41855305c36857b9c8dbb815d84173ffd08019559cde3a", @generic="f762731503b1ae10b459f4e0f2195c07d3377a14cb2e696fc33bf4eb7e91d7f50ce19a8bb3897d621c089cd2c92cab2c59d0c7619f39ee41e4593d6c1c293705099ee99b586c84d630d26fe50a9631c3b9dd1b4558c0c20d252e25cfdfa8f37476f298e579ff269254d89482dd178d044d3dae5ec0d0054ee8c8fe1e8c20b0dd5701", @generic="9eb39cf8de836eadcf64dfea960c60e1dad5d20dba7227206cb43951b3673edf63b3713f8202f7585bda2a874cfc75279b0318f3f038", @typed={0x8, 0x47, @pid=r2}, @generic="4db5e65cad03b964912fe7aed7dff3700fa624902ead1a0fecbb107f8c7960dcb42c204a72bf360b5531c4a2be467eb2b8f9b83ebfd467e7c33a778f45d5276a2db505a4ef729aaebbe39110454e5302b69437d0b64139f592401728a366d60ae210c39da1ab4835e1b367bcce48b6497c43a5e2b685934d20f59084375239f715ea31cc20fc76363bdb4c6f12e4ed63ffbcb907acaf4f65a346e4"]}, 0x294}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f00000001c0)=0x1) fchdir(r3) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x4001) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)=0x0) fgetxattr(r4, &(0x7f0000000100)=@random={'os2.', 'keyring/.\'-\x00'}, &(0x7f0000000240)=""/172, 0xac) r6 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000840)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRES64=r5, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES16=r4, @ANYRES32=r3, @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESHEX=r3, @ANYRES64=r4], @ANYRESOCT=r6, @ANYBLOB="282805eeabf8bfe484600f70d69b58db25", @ANYPTR64, @ANYRES32=r4, @ANYRES16=r4], @ANYBLOB="2388c6cb4242f5740b", @ANYRES64=r3]) syz_open_procfs(r5, &(0x7f0000000380)='syscall\x00') write$binfmt_elf32(r0, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x778) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x9a6}], 0x1, 0x0, 0x187}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000480)='reno\x00', 0x5) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e24, @empty}, {0x2, 0x4e24, @loopback}, 0x1, 0x0, 0x0, 0x0, 0xcb7e, &(0x7f0000000000)='nlmon0\x00', 0x2f, 0x9, 0x99ed}) r7 = dup(r0) creat(&(0x7f0000000280)='./file0\x00', 0x4) sendmsg$nl_netfilter(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38130000110210002bbd7000ffdbdf2500000007080018000000000004002d00701254009e59e8cdbf83bbebd251cf1907cb169849387c73be2326f0fbcc0a4f050701ad52b88bb67202a81b8bfd1da67607161698516774186b8552302b328d9304bd7835b541f7b2561c5f8b4103c9c6185fb6aa3f07a5117bc7a0ed6ec9071e7f113d1794fbd5a41ffe4515a1066b59c004e1c6580078878fc2b5546a72f81beb7ce1d20d45fc120fc7ef10ab5759a18d6a034e53941df9394a73b594bc583941ab4540d3398db6a49348990dffda6d99caeb3f9e4930063406182fb4f9822269ae9281bdd63a6a75e6c1f44f93b21b04ac39d4132074d9e452fa83ae9ccc16374c9a20fe0f23685b379538ca0f9fd8d882fcd0e73a1308007c004eeac99d43c37ecaa8194bd49de02f031b650bdeb76561f72b3eb7797e00000000000000000000000000000000c5ec18e499fdec950d3096e9fdb2546598707cf5e106e81a4224154acb5caabd4cd5322467af941e9db938d917d62d4f2d247ebc0d5c02df988d769646a93fb7623cf8ec2672aae9468295727bdfb823a28be87fe812cf8b3f407c3c826b24812009751a25be9b348eeff77250083086effa90feddc4bdfd12afafd79c2e074026d555b615485531b1b46204ee32cc9b79c14f12f5a36740a53961a9d0d8b5e9e43f617e42f6954b92afbbb5e249f6ec2ea3ca0f2bc8148be91275036d97572bf3b93b2e6348b626861ac43f1c09af0236bc95bd9f9dac5ddf678031198f77d85b61d4e2e5d7704de624119d5350cdf1f7ff2e5efce3b4368b115d9c2e8701b37588b263bc3ac76e163f8ba0241071d238994b4160c5b63d0b8f9e6777f0e7135f2bcf5f9312ba71e82544c880474610d0a5994fecb9e92316", @ANYRES32, @ANYBLOB="4e7d9e567c3a7da8b01398df4310ed0084290d15de45c45b7e21bb8b8336502969b075b48de9dff8f7bac81ddac312daa337ac612ba294e1dcf4eed8dab0e816ef48389ef62c7b959515cbd274b2ee4e91c657c4a84c7b39df55e399de78573be54ec6487a4c6d5afe31785950519bc9798d277feff4eecb93b8b862eb8ec6f44ec563c453e03c4bac230bf2e881f3b08949c10ac080f47d858dea29a9afa536c87f71572b589ebcacc70ec9ebf1563dbc5dea43fe31279cfa7b57bd3b99f3c23faf7428cb8f80a0df3f4d6bc294fcd451d3678dd5ba1ebf1d9331ea2ae7b1d94030552d3000517763ff291632ec2204003400d73d2648329192a7571e5eb70a270d87d1240c4c0e42356b023096dace39d7bab1db61b18284165b5e302c7516f7067d066209fab8578bfc7dc7308e9f33e26fd45bb61145aea39611665b4da4c3fbf11d363c5015495518d1b6e22374eb7c7d05e7dbffd4386770a22ada21eee9e38058e9380652ffec4e3b1b2960fa0c121421ef5f64d08cdc2097e61eb5d5096296dc0be616ca396c4cc29d8a933d7f7b86b128bffe020173d711dc10ceedf270c705ec72bf79fc3cd4655d9a36d8d00a70677bd4f1e618a35126e2101d5d29945af7a3060875a1521f435533aac064de8079b523e0ac8ae8c9e5ae2d3f8844cb741cdd8f84ea4a45ffffea1994e66e6c2dce5023fb2e792b6142591cb8e0437da6bac27dc4916297c7ae6f4e13b19c4a763564a6c92349adab51c324e56d80544c93952d5b353121e371967dc795140629e6619a9f3383672ad5554a2d5e866df5c64664f5232375f6a30f9fd298f2409a489970b9f8c55cedf815c7cf24f9148993e42c9f5a525a23fb25602a4a57995934e5d207ff4ab9b56c16df3c3b9d44bf764c92f446ad81caf9719607ccc5519a34d33762ac5f4e385c94425d08f06eca18777f84a74f7dacb666c0a9ad6649abac53b3bb39c56997d297d5f386296cd3e9f4a254e0da076ee4de9b7209ecf089a8bc06ca5b55de9dcb6660259242578e0ac2772da12d7e654f739856e937e9013c9b4fe6b042e902d763f9e27fd7c5a9ea2b3b66f960a0c85cbeb0daf3793740e56a36a68f21e338a6eebdbad645981ec709cb339fde676dc8e5f40f1054322e8dc4eb5a8b3682984771c093f98137120b0d578514f03277ad7f36b43d6b764533ec8f9686b6cbcc1501c7a9faa67912be54e67ffc2e315e1e8eef9509fbb3c565f495af2471adb954289b762251d4a0bc3ee08b5f8a47377d9da47e6f1d0d181a2c5ed7a2e943933054bf3acac7b66fd071234cab017720ef3fb8b748846e73b1f37653bd0ebf1fd69188ae9290e6a295e45a06ba2614a4b2fbf8cfff993e8dc3495973e0bdfa9e540394707b6b82cd948fd3d103c8a2a03b56f99ea50ec808b6c9c0792f140590425f42864959feefeeae5ac8e2ec174f607299d2b38a472c25be1d217e9cb1c6aa6cdb0e0388d32fe3ec72ab47e241268eda987e1eb5c611d3ebe978be88a84d1bf6257d53dcc84e0b1c49d5a5d1611e836005a60266af05632f0986fe405175d0c93716f7bb113107b1b121f91e7d7a3c64157845451cae76651e0ac8aad9832142745c155d48475b924fcbe045551f50d1ef318a287abb0156dd130fc6b41c8dc7ca0205dd13d35e7f2281fa18e0e6a3d027582d0a62fe08412a1c1207ef6f35b60fdcb05d0e0157dd93d1a61732bb4537bcd3052cea1b8768eb595074db80bb9137336d4358b4da553da0206287f410eb0b6035cd06b7a0ccf17f305201fe357eb3018e13d8e180364e68c9acc1bcf60209efec9305aa42a16a948e4c84e9e6356520fc1f5e3121c712fefb860b96a545dfe4faf4127beceab6ce0125800c8def002ac07543d0d44b198ba63dedf7c1b44d0eb43dde05e95a02f9188ed439817d43857dc71099319e9503e79f08ad3481a32b8f2ffbf79b3d574042dc572468fa1eebbede63e4b84299bee93017a168165185b0478bd50c46ecdb0163de9c901065e9b3c23b86c959dcf103423d629bc37b086d7b2247c0ee16a838c6e4f6e86a7922fea61d2053efc0274a44650dfe244c18d8642273f5ed8db74254d186e3e1adde24dacca65967f44ae397ac581e5f10a7517a5c73e1382cdf8a64f5b848cf26d528ec3cd628c3199c81a873f03eed35fc86fd878ad4f68a0b7689cc984d7fb19c80d3359a8f9ca725baa3f137e5de0465b93aad217a7b3af3bbf6255f9a39b65a507dc1a60ac0bbba97a3c6bc63878da639897efa9a94c548a0abcd3057043a9668b32cccb44423e4e62fde34ab1b4ff60fc5f435574ec014a09866b31a0f90a7b3635edfe30ee99f238303e5ff00783da084f037cfa2ba5746917e33988e93a561799596f1551b92ad628161fd95b7674f62c89eb5d2dfdb3155b70e2bd3da73c47fad29f8710f0fc7b640215bfde3bf671b55938671fa89d123c787507381617520ab7e0545b86dfd97732158d21238079e95cefd377b031198b33920e8611585644dbaf303ba27f86b4a9988702753e08aea451853df2ba37018"], 0x9a6}}, 0x0) 15:00:35 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) splice(r0, &(0x7f0000000400), r0, &(0x7f0000000440), 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r0) r3 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000004c0)={@ipv4={[], [], @loopback}, 0x71}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000240)={0x0, 0x7f, 0x7, 0x0, 0x11, 0x3, 0xc0000000000000, 0x7fff00000000, 0x3}) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r3, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r4 = getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r4) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') fsync(r3) write$P9_RSTATu(r3, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x3, 0x80000001, {0x56, 0x2, 0xfffffffffffffc00, {0xf6, 0x2a}, {0x4, 0x5}, @period={0x58, 0x100, 0x3f, 0x9, 0x7ff, {0x94bc, 0x2, 0x5, 0x1f}, 0x0, 0x0}}, {0x53, 0x100000001, 0x6, {0xa22}, {0x6c8, 0x401}, @ramp={0xf38, 0x3, {0x80, 0x0, 0x0, 0x8}}}}) r5 = socket$key(0xf, 0x3, 0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0x6, &(0x7f0000000100)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x2, @dev, 0x5}, 0x1c) r7 = dup2(r6, r6) setsockopt$inet_int(r7, 0x0, 0x32, &(0x7f00000001c0)=0x1000000, 0x4) getsockopt$IP6T_SO_GET_ENTRIES(r7, 0x29, 0x41, &(0x7f0000000a40)=ANY=[@ANYBLOB="66690312ee0a394e1919c2cdced96c74657200000000000000000000001b22548905378301be0c77640000000000000000000000000000007f000000eb17d49fdae82a492d676454fc1dd8b2cf3d576114fa182311e4f4a088656c030720fe8a3d75debad48d390f38aae7c3a3ac864f8017a7a4f680923517d76415116cf56c2f3f54d190ca4daf15496033f8b4ef42644d97f4d7bc41718cf62ba1aad730a5b708e87a363cbf6063707b75a6127dfa037b8e70914e6b36e5e5571020e020ecf7b27ad704b01c74b42bfbd5aa5a031af218a3e9c64e57066abc1fcf735501b4a2031350aebd724ed2a93a6ddd6bc0080cba9d6a96bbab59b6106509537adb17b171192c360df5dcd089f65ed4560666db4813ae515a4fe90548d15006ce31ff98c9a2f7c3fca43753366490081f9368205a8f745702818b02000000000000003cd99e85276601da5c57b71a6e4fec901aaacd524fccfb1e244f00"/368], &(0x7f0000000040)=0xa3) ioctl$int_in(r2, 0x0, &(0x7f00000001c0)) write$binfmt_script(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, r5, 0x0) 15:00:35 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:35 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 982.547994] input: syz1 as /devices/virtual/input/input58 15:00:36 executing program 3: r0 = memfd_create(&(0x7f0000000180)='\xe0|\x1e\x13L\xe1\xe7\\X\x0fBQ\xcf\xfe\xe9n\"\xddm\xba\xce\x88\xdd?wR\x81\xb1f\xcaq\xf4]\xa7\x1dx5\x8fM\xca\x8b\xf3\'\xf4P\x0eO\xb9\x17\x80\xaa\xaa=\x16\xae\xaa\x0f\x92)\x18\xf1\xd6\x02#\xac\xbc\xd9\xea\x14\x92\xf5gD\xd8\xdb9N\xcc\xc1`0\xac\xac\xb7\xfc,7\xa9&K\xe6V\xd9\x9c\xa5\x88\xd7\x8f\xb5', 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) read(r1, &(0x7f0000000600)=""/13, 0xccacf294) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r2, 0x4c01) signalfd(r2, &(0x7f0000000080)={0xa33}, 0x8) sendto$inet(r1, &(0x7f00000051c0)="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", 0xffffffe6, 0x1, 0x0, 0x92cc865) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) r4 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(r4, 0x40104593, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 15:00:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x20000000000003fa) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='setgroups\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x4000000000dc) fcntl$setstatus(r2, 0x4, 0x44c00) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r5 = getpgrp(0x0) r6 = gettid() gettid() r7 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet(r7, &(0x7f0000000180)=[{{&(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffff6b}}, {{&(0x7f0000000140)={0x2, 0x4e24, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000540)=ANY=[]}}], 0x2, 0x0) r8 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r8, 0x80084503, &(0x7f0000001100)=""/4096) sendfile(0xffffffffffffffff, r8, 0x0, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) rt_tgsigqueueinfo(r6, r5, 0x26, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) keyctl$join(0x1, &(0x7f0000000480)={'syz', 0x0}) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') writev(r9, &(0x7f00000000c0), 0x20000000000003fa) ioctl$TIOCGPGRP(r9, 0x540f, &(0x7f00000000c0)) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004050}, 0x0) getresgid(0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$inet(r0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x0) 15:00:36 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:36 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) epoll_create1(0x0) fcntl$dupfd(r1, 0x0, r0) eventfd(0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) unshare(0x600) pselect6(0x15, &(0x7f00000000c0)={0xfff}, 0x0, 0x0, 0x0, 0x0) 15:00:36 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000380)="757410630aa43c8d9e8f8b03219c3300000000000000000000000003000000000000000000000000000000000000000000a3f67c4b8f1b15d10da6e3844c16773a069e82cd319755a4d97c8623c01b9b0998b1627f69702bd583a9e17cd1a6d29207014ab365d4c4933b13ddadc8a9f7cf9f115fdb687fd0c04bd01f86f8a7caf10c25ed8cb5619c47", 0x89) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000500)={0x7, 0x4}) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f0000000240)=ANY=[@ANYBLOB="0900000645f7c88c0400000000000000abe928000000000000034d7ec3d8345f5fd86d9202f58ef62380501878e74156276c07d3de18456e91f751876e527a05907cfa"], 0x8) r5 = add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000680)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$negate(0xd, r5, 0x0, r6) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000180)=""/13) ptrace$getsig(0x4202, 0x0, 0x3f, &(0x7f0000000580)) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000040)={r8, 0x1, 0x6, @broadcast}, 0xfffffffffffffd78) setsockopt$packet_drop_memb(r7, 0x107, 0x2, &(0x7f0000000080)={r8, 0x1, 0x6, @remote}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000001c0)={'\x00\x00\x00\x02\xdf\x01\x00', 0xfffffffffffffffe}) ftruncate(0xffffffffffffffff, 0x2007fff) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'veth0_to_hsr\x00'}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3f, &(0x7f00000006c0)=@srh={0x3a, 0x0, 0x4, 0x0, 0x80000000, 0x50, 0x6543, [@loopback, @local, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}, 0xffffffffffffff69) fremovexattr(r2, &(0x7f0000000540)=@known='trusted.overlay.opaque\x00') timer_settime(0x0, 0x0, 0x0, &(0x7f0000040000)) [ 983.375064] device syz_tun entered promiscuous mode 15:00:36 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xb9e, &(0x7f00000000c0)='batadv0\x00', 0x3}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r5, 0x4c01) sendmsg$nl_generic(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x30000080}, 0xc, &(0x7f0000000140)={&(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="c3bc60f1570d90bbca51f889c97d21584a1e03a8c7b258774e6f7b86ceaf1ad4610286b386dad04260d795c00294ba376aa1e0c8a28488ef12fa6e6046165f5e0e4541b286f2a94ca79a308a4b00d2949da3304d4a0dbee691c9c8ed38ac677459cbaee9284ef51f72598136c30ecd40d798a67090f27f11877f06d46b07a8cc909d4b6558df08007600090000000000a9df51442cb56bcdbd450a3507926aa42dacad03ce923669abd30c1da8e0cf2a6b8238e44ffb95ed8ee85f05c722c2f321f8813c0709c5ac0722f3aeaf85ae6c9e5a8ad27b7f1273c80d3e8d41c4f6d0c769f27170018309e5cb5f6dd2640e74489654614e51f626f6d5e00c8cab9bd59547cc39f8ab367ec06f42bbffc8cc642fcae7b44c5cca9fe007155fe92094f4eed99a0010947bf945ad84a98f150dca6bf7d0ff41fb47ad2dae338f7b834c65c599c3b8bb60866112ff262a88a51e3b459cb947457ea28a027afc034cd87c2bc48c884c5d4ff0dc68d14ed0dfa0fd68437a3e5d34a52b72c19f7c67a66c31cfc5d2fb38d5bfd7218973c0b188a36c89d175cc2211025341311a1427fe8da389615eb4d1cbd53b90e90dc2b0e859891e025e384411e8ed73f5a37a549f78a614d932c6b91d9c2f4a6b0680684cc86c9ffeb4f6cf99b45220a22321faa8e4e9846e7adc96e1fcec9af9323c87b0978f0d5456ac24145dd5c48a6b29a97c9aa58384e2925ca41be0d42f31df775eb91d308fbd13486c3c993dd82d19fcbd20610007a5c0bbfaceccfca3e54ddabbbd9e9dc05af309"], 0x6c8}, 0x1, 0x0, 0x0, 0x2c01c081}, 0x20008059) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r7) r8 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x10001000a00) ioctl$VT_WAITACTIVE(r8, 0x5607) r9 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) lseek(r8, 0x0, 0x2) sendfile(r8, r9, 0x0, 0xfffffffffffffffc) lseek(r9, 0x0, 0x3) connect$inet6(r3, &(0x7f0000000800)={0xa, 0x4e23, 0x3, @local, 0x6}, 0x1c) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, 0x0, 0x14) rt_sigaction(0x0, &(0x7f0000000780)={&(0x7f00000006c0)="c4c2c9033c68abf30fa7c8c4c1792bb865566666c4e17e2dc1660fef0667650f50e10f38f94981660f7481a8b6e723c4c28903ec", {}, 0x8000000, &(0x7f0000000700)="8fc93802f3a9c64700008fe878c3530200c4e131c2d16567650faeb40000c4c2094681410000000f38ccb90060e27a660f381e9000000020c4e27d244b6e0f1be0"}, 0x0, 0x8, &(0x7f00000007c0)) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 15:00:36 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:36 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:37 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x68000, 0x20) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(0x0, &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', 0x0) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x0, 0xd4}, &(0x7f0000000340)=ANY=[], 0x0, &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd89") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) socket$inet(0x2, 0x0, 0x3f) pipe(&(0x7f0000000180)={0xffffffffffffffff}) read(r7, &(0x7f0000000000)=""/250, 0x128b9372) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r8, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001}, 0xfffffe2d) r9 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r9, 0x2081fc) shutdown(r9, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000180)={0xffffffffffffffff}) read(r10, &(0x7f0000000000)=""/250, 0x128b9372) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r10, 0x80045400, &(0x7f0000000340)) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 984.105778] device syz_tun left promiscuous mode [ 984.268995] device syz_tun entered promiscuous mode [ 984.300044] device syz_tun left promiscuous mode 15:00:37 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:37 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000001300)='/dev/zero\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc0205a32}, 0xc, &(0x7f00000002c0)={&(0x7f0000000900)={0x12c, r3, 0x4, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x81}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x4000050}, 0x24000817) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='ipddp0\x00', 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r4, r5, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r4, 0x4c01) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000000000)=0xfff) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 15:00:38 executing program 3: socket$netlink(0x10, 0x3, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$netlink(0x10, 0x3, 0xa) r4 = socket(0x4000000018, 0x0, 0x4) close(r4) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000001480)={0x20}, 0x20) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000380)="f08104d309000000c4e2fd32f5d8213ed277c6c4c151e067adc4c3010f9b37000000d3c4e3791daf95690000a30f0f830d000000a0f36318c4c3e9789d44000000f0", {0x4}, 0x4, &(0x7f0000000400)="65da1a260f601367660f382a3d66f0f79d7b00000065360f70bdfee5fcdfd2dd7b0065ea81c9000000000f3800a3fe1a00008fe940019800000000c4c219dd949b6537defe"}, 0x0, 0x8, &(0x7f00000001c0)) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x113) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) sendmmsg$unix(r0, &(0x7f0000005240), 0x3a4, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) recvmmsg(r1, &(0x7f0000004680)=[{{&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/182}, {&(0x7f00000005c0)=""/115}, {&(0x7f0000000640)=""/239}, {&(0x7f0000000740)=""/114}, {&(0x7f00000007c0)=""/35}, {&(0x7f0000000800)=""/182}]}, 0x515}, {{&(0x7f0000000900)=@in={0x2, 0x0, @broadcast}, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000980)=""/26}, {&(0x7f00000009c0)=""/50}, {&(0x7f0000000a00)=""/12}], 0x0, &(0x7f00000014c0)=""/4096}, 0x7}, {{&(0x7f0000000a80)=@can, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000b00)=""/41}, {&(0x7f0000000b40)=""/203}, {&(0x7f0000000c40)=""/209}, {&(0x7f0000000d40)}, {&(0x7f0000000d80)=""/238}, {&(0x7f0000000e80)=""/211}], 0x0, &(0x7f0000000fc0)=""/213}, 0xf4e}, {{&(0x7f00000010c0)=@ipx, 0x0, &(0x7f00000011c0)=[{&(0x7f0000001140)=""/35}, {&(0x7f0000001180)=""/13}], 0x0, &(0x7f0000001200)=""/58}, 0xfff}, {{&(0x7f0000001240)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @local}}, 0x0, &(0x7f0000004600)=[{&(0x7f00000024c0)=""/4096}, {&(0x7f00000012c0)=""/92}, {&(0x7f0000001340)=""/222}, {&(0x7f00000034c0)=""/102}, {&(0x7f0000001440)=""/13}, {&(0x7f0000003540)=""/4096}, {&(0x7f0000004540)=""/145}], 0x0, &(0x7f0000004640)}, 0x7}], 0x37a, 0x10041, &(0x7f00000050c0)={0x0, 0x1c9c380}) r5 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000340)=r5) 15:00:39 executing program 1: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x10) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) syz_open_dev$mice(0x0, 0x0, 0x2000) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000380)='y\x00', 0x2, 0x1) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in6=@remote}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000000)=0xe8) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, 0x0, 0x3, 0x0, 0x0, 0x700, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20}) close(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000740)={0x2, r2}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80800) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getrusage(0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0xfe) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) fstat(0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000003c0)=0x1) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000140)) sendmmsg(r3, &(0x7f00000092c0), 0x170, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x200c2, 0xffffffffffffd) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYRESDEC, @ANYPTR], 0x18) sendfile(r4, r4, 0x0, 0xa198) truncate(&(0x7f00000001c0)='./file0\x00', 0x81) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r5, 0x4c01) ioctl$BLKRAGET(r5, 0x1263, &(0x7f0000000300)) 15:00:39 executing program 4: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2000) r0 = eventfd(0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000002c0)=0x7, 0x4) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r2) creat(&(0x7f0000000840)='./file1\x00', 0x0) io_setup(0x0, &(0x7f0000000040)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffffffffffeb0) socket$packet(0x11, 0x3, 0x300) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') socket$unix(0x1, 0x1, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r9, 0x0, 0x27, &(0x7f0000000240)={@multicast2=0xe0000003, @local}, 0xc) close(r9) ioctl$FS_IOC_SETVERSION(r9, 0x40047602, &(0x7f0000000100)=0x40) setsockopt$inet_mreqn(r8, 0x0, 0x27, &(0x7f0000000240)={@multicast2=0xe0000003, @local}, 0xc) lseek(0xffffffffffffffff, 0x0, 0x2) preadv(r7, &(0x7f0000000700), 0x31f, 0x10400003) fcntl$setlease(r6, 0x400, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={@empty}) 15:00:39 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:39 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:39 executing program 0: setreuid(0x0, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x6}, 0xc) write(r1, &(0x7f0000000680)="f4176eff979a0e7bce259b093c5cf12464fc699cdfbb25a6be73f0b23ed2acce78884e4ea4bf8930aeefe1ca8e109ec32b24eb5e8b6c59000100002281d87697ff6a2e2ac446a9d10a8899795069947db79f786b041005a957ec46b5736d2707cb6061a84a63d60382a24361c44b85467eab2c3f5f32dbd647a734", 0xa2b6279) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) unshare(0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x40, 0x101) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a0", 0x0, &(0x7f00000005c0), &(0x7f0000000600)) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r5, 0x2081fc) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) openat$cgroup_subtree(r6, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) ioctl$LOOP_CTL_ADD(r7, 0x4c80, r8) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r8) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r8) statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) getpid() ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000140)) ioprio_set$uid(0x3, r4, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000044c0)={'ip6gre0\x00'}) 15:00:39 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:39 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:39 executing program 3: socket$netlink(0x10, 0x3, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$netlink(0x10, 0x3, 0xa) r4 = socket(0x4000000018, 0x0, 0x4) close(r4) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000001480)={0x20}, 0x20) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000380)="f08104d309000000c4e2fd32f5d8213ed277c6c4c151e067adc4c3010f9b37000000d3c4e3791daf95690000a30f0f830d000000a0f36318c4c3e9789d44000000f0", {0x4}, 0x4, &(0x7f0000000400)="65da1a260f601367660f382a3d66f0f79d7b00000065360f70bdfee5fcdfd2dd7b0065ea81c9000000000f3800a3fe1a00008fe940019800000000c4c219dd949b6537defe"}, 0x0, 0x8, &(0x7f00000001c0)) read$eventfd(0xffffffffffffffff, &(0x7f0000000180), 0x113) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) sendmmsg$unix(r0, &(0x7f0000005240), 0x3a4, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) recvmmsg(r1, &(0x7f0000004680)=[{{&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/182}, {&(0x7f00000005c0)=""/115}, {&(0x7f0000000640)=""/239}, {&(0x7f0000000740)=""/114}, {&(0x7f00000007c0)=""/35}, {&(0x7f0000000800)=""/182}]}, 0x515}, {{&(0x7f0000000900)=@in={0x2, 0x0, @broadcast}, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000980)=""/26}, {&(0x7f00000009c0)=""/50}, {&(0x7f0000000a00)=""/12}], 0x0, &(0x7f00000014c0)=""/4096}, 0x7}, {{&(0x7f0000000a80)=@can, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000b00)=""/41}, {&(0x7f0000000b40)=""/203}, {&(0x7f0000000c40)=""/209}, {&(0x7f0000000d40)}, {&(0x7f0000000d80)=""/238}, {&(0x7f0000000e80)=""/211}], 0x0, &(0x7f0000000fc0)=""/213}, 0xf4e}, {{&(0x7f00000010c0)=@ipx, 0x0, &(0x7f00000011c0)=[{&(0x7f0000001140)=""/35}, {&(0x7f0000001180)=""/13}], 0x0, &(0x7f0000001200)=""/58}, 0xfff}, {{&(0x7f0000001240)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x0, 0x0, @local}}, 0x0, &(0x7f0000004600)=[{&(0x7f00000024c0)=""/4096}, {&(0x7f00000012c0)=""/92}, {&(0x7f0000001340)=""/222}, {&(0x7f00000034c0)=""/102}, {&(0x7f0000001440)=""/13}, {&(0x7f0000003540)=""/4096}, {&(0x7f0000004540)=""/145}], 0x0, &(0x7f0000004640)}, 0x7}], 0x37a, 0x10041, &(0x7f00000050c0)={0x0, 0x1c9c380}) r5 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000340)=r5) 15:00:39 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:39 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:40 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:40 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x40000, 0x165801) io_setup(0xd, &(0x7f00000002c0)=0x0) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000001100)=""/4096) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) r4 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r4, r5, 0x0, 0x20000102000004) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r7 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r6, r7, 0x0, 0x20000102000004) io_submit(r1, 0x2, &(0x7f0000000640)) 15:00:40 executing program 4: capset(&(0x7f0000002ffa)={0x20080522}, &(0x7f0000002000)) pipe(&(0x7f0000000000)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) write$selinux_load(0xffffffffffffffff, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x4b) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) r2 = socket$inet6(0x10, 0x80002, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='set\xbe\xbc\xe6\x1bw\'\xb7\x97\xd6M3\xc4\x1es\x00\xbe\xa3`\x19\x04\xd6CG\xa1P\x9a./@\xe6j\xa5\xbfG\xecs;%\x19\xcfXH\x99>\xb9\xf1:]\x91\xa1\xc6\xcd\xc4\xe5\xac\xee\x16\xbc\xc4\x7f1\xf2`w') dup2(r3, r2) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000980)={{{@in=@initdev, @in=@dev}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000001e40)=0xe8) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) r7 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r7, 0x80084503, &(0x7f0000001100)=""/4096) r8 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r9 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r9, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r8, r9, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r8, 0x4c01) r10 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r11 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r11, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r10, r11, 0x0, 0x20000102000004) mount(&(0x7f0000000880)=ANY=[@ANYRESOCT=r11, @ANYRES32, @ANYPTR=&(0x7f00000003c0)=ANY=[], @ANYBLOB="9d86b0a51c18509ed8751b1f000000000000009cb92f20f2d248a1cf5150ec03fe2d425bed4da29938c1a9cea94ac54b1c022184f4a5a5562d771119f8d0c5114f5f9b4ab4a37cc061af25ecb7d0088328b6f6955d2c8d480f3a943d3ecced0a0da33889674a0578505b7f4142faf12bf923a7c01be8ee61c231fa3c86fd958b041963132c03bcf5e0922935ec5f78310670774822e73c18e5446ddf164d8c111b0c43a063ebe381", @ANYRESDEC=0x0], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0xc0020, &(0x7f0000000380)='setgroups\x00') r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') openat$keychord(0xffffffffffffff9c, 0x0, 0x44501, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) sendfile(r12, r12, &(0x7f0000000180)=0x74000000, 0x5) 15:00:40 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:40 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:40 executing program 0: pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000001780)=""/109) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) r4 = dup(0xffffffffffffffff) sendmsg(r4, &(0x7f0000000780)={&(0x7f0000000380)=@generic={0x0, "ff80f096dc909d329774e6a8dade60ee2bdaabb4abb857eb5baec14815f0a69bd69feee1c43c775ac38e40b47b092d7cc165e503fe31d4a94a66d3c1b3b41af77425d24669a3ca462de284e1169bd5babd3312ebf023fe460ed630e38452416f2d51ff14660be2eed6bba6e5352188bd025b6f60cc8bc400a25a3350e207"}, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)="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", 0xfa}, {&(0x7f0000000080)="5c854701969bf896", 0x8}, {&(0x7f0000000400)="ff8d", 0x108}], 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="0c010000040100000200000086afb64558f97adedd0deedc6fb89606e3669d9be2819278a6a0f689dd4964cf6363b529fe2d09170506b7efec092c6a9ab788870f120900b3411a1cfdb6a7035269c639a2a1a651fc579a009907c6506a781453fcd56eccc3be8b7272e4329d8c3a853403c9c0a8296f0058cd0acc3bb949b12bf9d69111b58f1ee6dc3c3aa9c3c7efe29c7aab33fcdea556bc3fd8586a31fdcc7926ffc2e7497e221bf28a6f70d82b9341759cf339e4c14fad61dd609fa214155b529388b71a5e159352ffb817cf74239737bf533adec59fb0ea217add50db0ba265dfd23ac67f5e71ceaa7bcccf9bb5a9ecd0863c0183a601e3306aca3dc2fe4a3a32249cf82e60fadf2b00"], 0xffffffffffffffa1}, 0x40) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) fcntl$setsig(r2, 0xa, 0x25) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) sendmsg$nl_netfilter(r7, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000880)=ANY=[@ANYBLOB="462183826eede36fe0f156a1129b0502e96712f7fc73f8505db23015b3d040ee36abb9beea04e61c06850d449110f7972c09968789c9f5cd9f9061e4aafdc94df81dbc7734b4bd3e0dea5c8985b44f74af0ec1f42ad55cb83f0ad41a8108e1f22c30da1bdf10e02c3aaded2b78354b1604fc481aeaa55b464ab45203905b6fe06e6df74ee2ace7b7d583c639b7d54a199a32ff4b81813ab6ea1b4d3e4c040f9738a83934cb0b342aa616795e709cb6806c29"], 0x14}}, 0x0) fremovexattr(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB="99000000009f0cb5bc5ac3edd6f2005563b198a8dd350724219f65"]) sendfile(r3, r5, 0x0, 0xfffffffffffffffc) sendfile(r3, r5, &(0x7f0000000040), 0x8000fffffffe) remap_file_pages(&(0x7f0000ff0000/0xf000)=nil, 0xf000, 0x4, 0x200, 0x0) 15:00:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fstat(r1, &(0x7f0000000100)) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) getsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x27) read(r4, &(0x7f0000000000)=""/250, 0x128b9372) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) fcntl$setlease(r1, 0x400, 0x2) 15:00:40 executing program 1: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000), 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) syz_open_procfs(r0, &(0x7f0000000180)='coredump_filter\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x12) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) add_key$user(0x0, &(0x7f00000007c0)={'syz', 0x2}, &(0x7f00000006c0)="bb120a7889345606d132dd8b80966668658b89fc789da6efcb35f7645b2382f095cc6de23040b0d6e7e51734f26e79b713fffbd9a5a451811fd887fa87d43fc4f89522452dab750a68fa0eae845eee67dff677febe8dfd2c78b81881f84126e811a716d686d837db06803f62ed6188589f113501cb0671d6742660e945c9115306ed4172fd631fa958005bb913e59fdc658ae5", 0x93, 0xfffffffffffffffa) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) timer_gettime(0x0, &(0x7f00000003c0)) sendfile(r1, r3, 0x0, 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(r6, 0xbb5f217a594926b4, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={r7, r8+10000000}, &(0x7f0000000140)) tkill(r0, 0x15) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, r5, 0x0) 15:00:40 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:41 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:41 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:41 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:41 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:41 executing program 4: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000080)={0x0, 0x2, 0x3, 0xfffffffffffffffc}) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) lseek(r1, 0x100000000000000, 0x2) sendfile(r1, r2, 0x0, 0xffffffffffffffe1) sendfile(r1, r2, &(0x7f0000000040), 0x8000fffffffe) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x0, &(0x7f0000002180)=0xfc, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) 15:00:42 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:42 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = timerfd_create(0x9, 0x80400) write(r0, &(0x7f00000001c0)="5b039dcbda41e9fe61c81c5fa59ce6ce8dae1c6d46b769665dae20ddc56ad6ec4731631fa431c950742aa69d6a2d963e58017c93c522cc320e0dad88236b97f5a362b0796f7c1c4033a19ba7d64977442d1179d2a3c30c2e8bf29bba74d439e524b1333016751b70c6b2f105cf6c1e15e86057470be0a6fcfb2941b6fb0d97141fbd52dc069944ff4d4042c07bb50c31b35ccc413720e01e9fa1e59d1527e1a4a5ff758805f726e096a6e080", 0xac) fchdir(0xffffffffffffffff) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x104) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da}, 0xfffffffffffffd27) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000400)={'nat\x00'}, &(0x7f0000000180)=0x50) r3 = creat(&(0x7f0000000500)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) lseek(r3, 0x0, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x802, 0x0) r5 = getpgrp(0x0) ptrace$peek(0x1, r5, &(0x7f0000000100)) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000000)={0x0, 0x0, 0x100000000000000}) write$P9_RGETLOCK(r6, &(0x7f0000000380)=ANY=[@ANYRES16=0x0], 0x2) lseek(r6, 0x0, 0x4) sendfile(r3, r4, &(0x7f0000000040), 0x8000fffffffe) mkdirat(r1, &(0x7f0000000380)='./file1\x00', 0x180) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40b4938785df3185, 0x0) 15:00:42 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:42 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:42 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e) pwritev(r0, &(0x7f00000016c0)=[{&(0x7f00000001c0)="2e2b223e6bde87fcffae6466398ce7e5364714208039e6d66e588714ec533d72cf165489b6eeed9ae5008d42075ae9cb95f7a04a6deca8e07b3d79fd4b2ba5e972000f6cb9d575f13fb7230b9be56353d7917d1ca966cc9faf9909b5e52a78c1cc84929c8e89b163e3c8b9eba5226e6559efa8d8b5ffd068eb62f718339c34a7f67883a92fe9f2bb1ca8ff5f9042bd84467b97cf7bcc419ed2a85f3a6426cdeab5", 0xa1}, {&(0x7f0000000280)="d1cfe096fe878372cece03759addb1d9d58538b0c27ffb5ac57d12b2194ec5566891bb152a0baf1f8a93262ac20c5747e3391e090905db6e2e8edd288258f04b2d58f2", 0x43}, {&(0x7f0000000300)="54f07792cc35c85ca6d29af0e433d900fd3c028896b354d98f5109f05c4ebad0f1", 0x21}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="9704ac75d00d4c3ef291d2831bcd7e7fb5720d91b6a7cb5656867bfde68bbc29288c7ee6cc29250ea3c6786668442f63f021f257cc747660d531ef48ee650cd107aa1747b41db4f7dfce940a7e46d611a02d2ba873343ccccbd2196da483e39e61fb6a23500e88e2349b92440da8bf4b1f214d3bc090bea2ac15e0e4da9cd0328aaa7681dd1b79526eafaf752749", 0x8e}, {&(0x7f0000001400)="1ead5fe0fe073f8fa2bfa6ec06d8dd7f9f4c37e7dba032cdce8157b1c6c9e73dccb4b8c4480378790be00d3362c1b0cee6d36c177a580b7f319e9b67a7ea70ad69b7b8d227a5556b131e3403a7467950f7ce3f53cac70e250e22ec7a00d5fcb27ccf0a90bfcd89b8b4e030044c0ff146a259fbc1bf5de18fad88e80402296cf98cda66ef5acf10b80d8ec1149947bc16776c64311aed2e515df4a9add6842c97f7fcc41830843232751f0257ac9ad764a5b39a3c386ab2", 0xb7}, {&(0x7f00000014c0)="752f3b3f283d1da1c1cb6aa673e1f6dfd9496a2b78680c80543849e68c8c0f9a7dfbd84bba0adf75427d777578f61ef7f867ee8a490a8471ebb572517493d87f13e0003125d93b928ed693ef0f79b517a04080a954af16e92b20758d93efe61adabfe3b0cf8ef8568be3ad51f0d3f4b23fed045610b42feaaf21a3555273a744c7b2c68141a8280856d2000282825457c3b7bb7da173cf4ec743a5fbc3274ea1d196e35e2e428fb8cccd60f921edc67df1640a509e320e73872573793e8f43bfec84adb972c11ba7774b41e2e3913afdc2bc4b406eb51f2b0510040b55682429ac49ab74d2", 0xe5}, {&(0x7f00000015c0)="b53c11440d2fc4311c87074752aab67348aa3c4e4407003f3de02bd2ac2522c103561b24abe920d99bb5e1cad72dea9372ce18a99805b479fba7c8eae1ea769e37fc049f3c13080c8008b702734788c5416ba385183f6e84603c96517a6bfddb3e602cd327a682206e78ecd139cff08347ab8b8bcedd0dc095e617914a82dbbf5c5f5c4259660954be5ea28211cbf81ca69a6b90868b6539c0e7ac4f7531026aaa3fe0460167548b1f6382f90ceb1ea9e5724c53703232c97f0d960b34bf212f2fc64be58a65e7f48dd86fc0decd8fc79fa86d93c7f06e", 0xd7}], 0x8, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) write$P9_RSTAT(r2, &(0x7f0000001700)={0x5a, 0x7d, 0x1, {0x0, 0x53, 0x5, 0x20, {0x0, 0x1, 0x3}, 0x10000, 0x7ff, 0x3, 0x444c, 0x8, 'net/arp\x00', 0x8, 'net/arp\x00', 0x8, 'net/arp\x00', 0x8, 'net/arp\x00'}}, 0x5a) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdc01}, 0x20, 0x0}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) 15:00:44 executing program 1: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x39) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/rt_cache\x00') ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000540)) write$uinput_user_dev(r1, &(0x7f0000000080)={'syz0\x00', {0x4, 0x1, 0x7, 0x9}, 0x45, [0x10001, 0x0, 0x401, 0x0, 0x5b98, 0x4, 0x800, 0xfd6, 0x2f, 0xa00, 0x5, 0x1, 0x50, 0x81, 0x4, 0x4, 0x18cdc8ce, 0x4, 0x9, 0x6, 0x6, 0x3, 0x0, 0x3, 0x1, 0x2a62, 0x4bab, 0x4, 0x2, 0x3, 0x40, 0x70bd, 0x400, 0x2, 0x100, 0x1000, 0x1, 0x3a52, 0xff, 0x0, 0x20, 0x8, 0x1, 0x0, 0xffffff55, 0x1, 0x2, 0x1f, 0x1, 0xb57, 0x1f, 0x10000, 0x8, 0x7ff, 0x8, 0x9902, 0x8, 0x3f, 0xcc, 0x2, 0x3682, 0x80000001, 0x78, 0x8], [0x8, 0x1000, 0x80000001, 0x4, 0x3, 0x3, 0x20, 0x5, 0x3ff, 0x9, 0xffff, 0x0, 0x2, 0x200, 0xffff, 0x9, 0x1, 0x0, 0x519, 0xffff6d49, 0x1, 0x8, 0x0, 0xfffffffa, 0x2ce, 0x9, 0x6, 0x1ff, 0x9075, 0x6, 0x0, 0x1, 0x2, 0x7, 0x401, 0x356, 0x800, 0x1, 0x1, 0xfffffffc, 0x4f32f559, 0xfdee, 0x7ff, 0x7, 0xfe3d, 0x9, 0x5, 0x3, 0xba, 0x5, 0x80000000, 0x2, 0x3f, 0x2, 0xfff, 0x1, 0x81, 0x1f, 0x5, 0x8, 0x8, 0x9, 0x7, 0x5], [0x63, 0x7f, 0x9, 0x4, 0x4, 0x0, 0x4, 0x1f, 0x3, 0x5, 0x81, 0x1, 0x6, 0x3, 0x9, 0x7, 0x2, 0x1000, 0x3ff, 0x563a, 0x4, 0x5, 0xe7, 0x7, 0x4bab, 0xfffffffa, 0x7f, 0x4, 0x0, 0x1, 0x1, 0x9, 0xca1, 0x401, 0x1ff, 0xef, 0x40, 0x2, 0xffffff80, 0x7ff, 0x10000, 0x0, 0x2, 0x0, 0xfffffffa, 0x2, 0x7, 0x18, 0xd9, 0x2, 0xfff, 0x0, 0x4, 0xdbc, 0x8, 0x8, 0x2, 0x0, 0x1, 0x2, 0x6, 0x2, 0x100, 0x7], [0x81, 0x80000001, 0x4, 0xc7, 0x6, 0xff, 0x7, 0x2, 0x2, 0xfffffff8, 0x80000001, 0x3, 0x2, 0xfffffffd, 0xe, 0x8000000, 0x10000, 0xfffffffe, 0x5c9a, 0x7fff, 0x1000, 0x8, 0x10000, 0x1, 0x3ff, 0x7, 0x1, 0x1, 0x9, 0x80000001, 0x8001, 0x1, 0x800, 0x3, 0x76a6, 0x8, 0x7ff, 0x3, 0x4, 0x0, 0x20, 0x1, 0x6, 0x29e, 0x1, 0xffff, 0x7fffffff, 0x3, 0xd6b, 0x7, 0x7, 0x9, 0x9, 0x7, 0x6, 0x20, 0x6, 0xa5b7, 0x0, 0x5, 0x20, 0x5, 0x6, 0x7]}, 0x45c) r3 = dup(r0) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000001100)=""/4096) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r5) r6 = gettid() r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f00000005c0)=0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x58000208}, 0xc, &(0x7f0000000600)={&(0x7f0000002100)=ANY=[@ANYBLOB="58040000080b04002abd7000ffdbdf2507000004f4204bdc7bf0d97ab22f33383c810a7586c37918b5284da79fc1097cee2e6ce42cba94f2ebba4eafcea0dfc6e608001800", @ANYRES32=r4, @ANYBLOB="6248cc0da2c74a3f68815472416221f6e42bf8aedd763e121eeef9b0b0122d444303e6bf4b36afb39996f415c5c8e11ab058c367e4bbcee25eb4a658acb272772fe835d19420cdf90ccbb67f1d4754e1bd89c3fbc1885f8054cf514104e6734f2e3c02b0122c81c8b127828dc9187ad2f883172724a138890b3d0129694fbf488258bff83a69005694f5a74def8a07b9de2dd6a54e98eae84324a808bebc7f2eed3ac379834f7b3e8b55cc95fd9ea72a77f9842dc90695c2f3a1d9853aec6649d8c3cfc4213df15fa7cae0003c0008008a00", @ANYRES32=r5, @ANYBLOB="08003700e0000002a4e215d2d2facc6020c6d5637ff4d988076d23a2fdceebb96253c3d4a39dcdf14dcc1a483522ea4504af8b2cc1ebb07ae32178641b0e68ea2f2534c815c393f17c5779401d2c8438bea002a9189ae0df130cf4efabf03fafa382009a7a68517dce7f45ba3b04b73a417675bfc456dd572ce51958d3174c4900ef1ecb7a28145c9a3e60641001be22955d337b3d5ddf76c71f550e5e40c1056c70f6e9eb3eabdf751149bee798295c704b3e6e3fdfa33a0cd7ab32b9683e777550cb16f0149e811bd92bbe77a366af7fda593c8cec62b7ad2568cc14e960ed4505be01a0640cce5c5ba60a1a3685667ba2407a442bf662a714eeb78e0cacd453de4d0660beb31a10896a154b583db02b210de30102951d59e00101000000000000480c2a24db845b91379fbf2244e99b4bf2809e5bba6bbb1a3b7653b3a373d937c29ca0b08e7a4635cd2c69f85b5f6238294e798cd2c63c80fb2c507d29bfa28a18ef7a4d2caec72d468decc622e71b4860d657446b76594504e4e625def0f84e81cbd605de6bd87359559855db0c0e5cd4c6a12c86e93671c10d11614b1af2613dec000700b8fa4cf021a1da0e57b832c31b04811ae0ac52a5518e6ec6ab1547c83ccbb12adfd9bcb78de5bdf92bf0a6c2f53e181ae8080e148db7949f1273a8295241ff49eac1e45e427900af478f2a4e6ddd6a07ad88c49b3e4ec46de0285d0a434df7f2abb0671bc0a5765c7849aa5f959e285b7bac43a227696284d52ac74929f9d22f1640039ae5c85c108fc98d2a1461fe08d9558fc6e6eadd89be4555ec3a58a625b35f795611473d0e42814a3fdf919c3e75350b241bd9ad999b9ffff005d88496e24488e7db34b080719cd0e35bde13ee01637e83c1bee5f4bc5df48f10a7108f6bdb70fa2ff213478d1ead196efd8ab44d07be580a22f511c4b729fb2bfa066e310e67eb3e2aae768d4bf0282365867992ab5da69148982fa883e05b5e710c916cfd24a5bb0fab056694b7f4c6867a181c1b9ee77c1bc14ed93d329cf790b0276423ec2655a47fe39f123d80aa2860d32d1c2a12290cb7db68bdadbc0e1953a6ffa716f9f6274967d58094180ee3bf4ee8379ad135d31caf5ade70f765e2e07b08001800303a3f05527d32225d8292ab0f2adadef5ba3e22b9553f165703008055de1eca9b168ceec759cb88c321f74c68a1e07def21be913a215e86a095bba6b858a0861ef25f57d32f8e61b47c56cbb6012e4847f1", @ANYRES32=r6, @ANYBLOB="08009100", @ANYRES32=r8, @ANYBLOB='\x00\x00'], 0x458}, 0x1, 0x0, 0x0, 0x900}, 0x20000004) write$uinput_user_dev(r3, &(0x7f0000000980)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_DEV_CREATE(r3, 0x5501) 15:00:44 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = timerfd_create(0x9, 0x80400) write(r0, &(0x7f00000001c0)="5b039dcbda41e9fe61c81c5fa59ce6ce8dae1c6d46b769665dae20ddc56ad6ec4731631fa431c950742aa69d6a2d963e58017c93c522cc320e0dad88236b97f5a362b0796f7c1c4033a19ba7d64977442d1179d2a3c30c2e8bf29bba74d439e524b1333016751b70c6b2f105cf6c1e15e86057470be0a6fcfb2941b6fb0d97141fbd52dc069944ff4d4042c07bb50c31b35ccc413720e01e9fa1e59d1527e1a4a5ff758805f726e096a6e080", 0xac) fchdir(0xffffffffffffffff) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x104) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da}, 0xfffffffffffffd27) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000400)={'nat\x00'}, &(0x7f0000000180)=0x50) r3 = creat(&(0x7f0000000500)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) lseek(r3, 0x0, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x802, 0x0) r5 = getpgrp(0x0) ptrace$peek(0x1, r5, &(0x7f0000000100)) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$FS_IOC_RESVSP(r6, 0x402c5828, &(0x7f0000000000)={0x0, 0x0, 0x100000000000000}) write$P9_RGETLOCK(r6, &(0x7f0000000380)=ANY=[@ANYRES16=0x0], 0x2) lseek(r6, 0x0, 0x4) sendfile(r3, r4, &(0x7f0000000040), 0x8000fffffffe) mkdirat(r1, &(0x7f0000000380)='./file1\x00', 0x180) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40b4938785df3185, 0x0) 15:00:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='.u\x00\x00\x00\x00\xe7\xff\xbas\xa7O\x96D\xa5t\xff\xd2I#\xb4\xd1}\xc3\xdec\xf7\x8f\x04\xe8\xc3\xa8\n\x8c\x89]W\xc2\xb9]O\r`R\xf7.\xf1Q?l_|\xc8od6\n\xed\x19\xc6\x9a\x9dx\x87\xe7\x156\xbb\x7f<\xd8\x81\x15H\x1d\xa7\x18\x96\x12v\x1fLO@\xa0\xd5=\xd9NEi\xdd\xf6\x13\"\xfb\x14\t~]=\xae\xd7\xc5c\xb3\x8b\x89\x9fg\x938.\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\a\x91\x9fl\x89\xed\x02\xb0\xfd\xc43\x8c\xa8\xbfo\xdc\x1b/c\xa8\xd3\x9c\xcaFpU\xbd\xea\x97\x9c\xd7\x1d:\x91\x93@r\xf1\xcb\xb0=\x02\xaa\x05\xe7\xda\x9a\xf9/\x1b\xea\xa8\xc4F\xa3\x99\x8c\xeb4\xa1\xf3\xb3\xe5m\x032\x12C\xe6+J9\x85a\xef\x17W\xabRX\xd1B\xfb\xc4\xae1\x96\x1c9\xc1\x19\xb9%/)\x9b\x01\xe3\xa9\xc1\r$\xe3\xcd\xd2)/\xc1d\xf2\xf0\xf7l\xd7\x1e\x1b\x0f|0#\xc0a\x98\xa2\x91\xb2K\x89\x8c~\x19v:j\x1e\xddB\xf0@\xb9G\x9e\xa5M\x94\xef\x7f4nm\xc3\xca\x9au\xb1\f\xc6\x82\x177\xbb[\x81\xa5\x82\x02J1\x96\x82-\x19k\xee\x962\x81\r \xfd\x10\x06\xfet\xe0^v\x8bg\xd3Nh\xc5', 0x200002, 0x0) fchdir(r0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000340)={0x3da}, 0xfffffffffffffd27) write$cgroup_int(r1, &(0x7f0000000180)=0x3, 0xffffffffffffff31) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000400)) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) fcntl$lock(r0, 0x6, &(0x7f00000003c0)={0x0, 0x2, 0x80000000, 0x2, r5}) r6 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f0000000140)) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r3, 0x1, 0xffffffffffffffff) mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r8 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r8, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) renameat2(r8, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r8, &(0x7f0000000280)='./file0\x00', 0x2) renameat2(r8, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r8, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) sendfile(r6, r7, 0x0, 0xfffffffffffffffc) write$eventfd(r1, &(0x7f0000000080)=0x8, 0x8) sendfile(r6, r7, &(0x7f0000000040), 0x8000fffffffe) 15:00:44 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:44 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 990.579849] input: syz0 as /devices/virtual/input/input59 15:00:44 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'veth1_to_team\x00', {0x2, 0x4e23, @loopback}}) r3 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r7, r8, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r7, 0x4c01) sendfile(r4, r7, &(0x7f00000002c0)=0x74000000, 0x5) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r9, &(0x7f0000000380), 0x8, &(0x7f0000000440)) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r10, 0x5429, &(0x7f0000000240)) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r11, r11, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r11, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r12, &(0x7f0000000380), 0x8, &(0x7f0000000440)) waitid(0x3, r12, &(0x7f0000000380), 0x40000008, &(0x7f0000000440)) gettid() r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r13, r13, &(0x7f0000000180)=0x74000000, 0x5) ioctl$TIOCGSID(r13, 0x5429, &(0x7f0000000240)=0x0) waitid(0x3, r14, &(0x7f0000000380), 0x8, &(0x7f0000000440)) syz_open_procfs(r14, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000380)="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") fstat(r3, &(0x7f00000005c0)) r15 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_int(r15, 0x1, 0x15, &(0x7f000059dffc), &(0x7f0000000140)=0xffa3) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3b, &(0x7f0000000080)=""/96, &(0x7f0000000100)=0x60) 15:00:44 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:44 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r2, 0x4c01) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r7}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002bc0)=0x14) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r9, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000002c00)={'team0\x00', 0x0}) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r11, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r12}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002d00)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000002e00)=0xe8) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r14, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) getsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000002e40)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000002f40)=0xe8) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r16, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r16, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r17}) r18 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r18, 0x2081fc) getsockopt$inet6_IPV6_IPSEC_POLICY(r18, 0x29, 0x22, &(0x7f00000034c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f00000035c0)=0xe8) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r20, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r20, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r21}) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r22, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r22, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r23}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000003640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000003600)={&(0x7f0000005800)={0x420, r5, 0xd1c, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8}, {0x84, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xbc}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xc97}}}]}}, {{0x8, 0x1, r12}, {0x50, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x1800, 0x6, 0x1, 0x3}, {0x5, 0x2, 0x7, 0x800}, {0x71b7, 0x3, 0x3}]}}}]}}, {{0x8, 0x1, r13}, {0x1a0, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x6, 0x4, 0x6, 0xf4b}, {0x1, 0x0, 0x5, 0x80000001}, {0x101, 0x81, 0x3, 0x4}, {0x4, 0x6, 0x4, 0x3}, {0x2, 0x20, 0x0, 0xe}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5a}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0xb4, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xea7}}}]}}]}, 0x420}, 0x1, 0x0, 0x0, 0x10048004}, 0x40000) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f0000000280)=""/85, 0x55}, {&(0x7f0000000780)=""/4082, 0xff2}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000140)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}], 0x6}}], 0x1, 0x0, 0x0) 15:00:44 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000640)) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[]}}, 0x0) fchdir(r2) r4 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000740)='./bus\x00', 0x0) epoll_create(0x3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_mcast\x00') readv(r6, 0x0, 0x0) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000400)=0x3) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='\x00\x00\x01\x00inux/enforce\x00', 0x2667db369656d0c9, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x6) prctl$PR_SET_FPEXC(0xc, 0x0) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r7, r8, 0x0, 0x20000102000004) r9 = dup(r8) write$P9_RFLUSH(r9, &(0x7f0000000100)={0x534}, 0xffffffffffffff4f) r10 = getegid() getsockopt$sock_cred(r5, 0x1, 0x11, 0x0, &(0x7f0000000200)) ioctl$TUNSETGROUP(r4, 0x400454ce, r10) fsync(r5) fsync(0xffffffffffffffff) r11 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r11, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r11, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r11, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r11, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r12 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r13 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r13, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r12, r13, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r12, 0x4c01) r14 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/member\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r11, 0xc0306201, &(0x7f00000006c0)={0xe8, 0x0, &(0x7f0000000980)=[@dead_binder_done, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000b00)={@ptr={0x70742a85, 0x0, &(0x7f0000000280)=""/205, 0xcd, 0x2, 0x2b}, @ptr={0x70742a85, 0x0, &(0x7f0000000a80)=""/119, 0x77, 0x2, 0x10}, @flat=@weak_binder={0x77622a85, 0xa, 0x2}}, &(0x7f0000000140)={0x0, 0x28, 0x50}}}, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000500)={@ptr={0x70742a85, 0x0, &(0x7f00000001c0)=""/46, 0x2e, 0x2, 0x1}, @flat=@binder={0x73622a85, 0x0, 0x3}, @fd={0x66642a85, 0x0, r14}}, &(0x7f0000000480)={0x0, 0x28, 0x40}}}, @exit_looper, @register_looper, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000580)={@flat=@handle={0x73682a85, 0x1000, 0x2}, @fd, @ptr={0x70742a85, 0x0, &(0x7f0000000880)=""/234, 0xea, 0x2, 0x1}}, &(0x7f0000000600)={0x0, 0x18, 0x30}}}, @acquire={0x40046305, 0x2}], 0x8, 0x0, &(0x7f0000000680)="81e24b425eabde2a"}) socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x80800, 0x100) 15:00:45 executing program 1: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:45 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:45 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0), 0x4) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) write$selinux_load(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="972f553ec719f6272234a5539840c07bdee5c6cbd21afd452e495595e1a33f117cd2e88ac80d5f00765035b6e4132a2d160ac3f104058d6a1a432884cc5aec4b15168e7d4a7478435ef58ed656dbd2b7cbb68e06a1c11af2fa5b9e1f68f9dab549508a51f8e202d5ca6c8e44b95ac6b8e710bee951ed11f5c3d5554221f0921a2b9b918500000000000000005268e628c6368fd1c1a8146e38d02a9dc475a56861f082a55ff9cf5beffcd2167ad69c9d6c121a383ef1bc19d82a74c3f88a6e3f67ebcb2897c8ae4f707c35ce20f5013d20bd175ebc679a5e1621cbbde6e424dd3c7f3d593af10a6ec93dd2e889c378ecace093"], 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000480)='./bus\x00', 0x1) fcntl$setstatus(r3, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xfffffffffffffffc) setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.upper\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="007bb40218e4efe4b1de02c4a535eac251b2dfba48ccdb309a68453eb08cd935b4519b3e80a4dc0ceb3444082cc7fc6473e8e4d069f9b2c71a8731c920621b9baee28616f1fb6c1fca838998777f3f48c7e5d1d2cb61e5350381d78add000ae603fc54fcd949c95766fa5465770862501b854b5f0ed52dd54cdf99612266913b623f2a50c185e4b9a65e8b3f68c0e673dbf638081ac53f348281604087654b4ad5f76cc2162c5291000400009b58304a"], 0x1, 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x0, 0x0, 0x0) sendto$inet(r5, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r5, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0x27c}], 0x1, &(0x7f0000003780)=""/232, 0x1fb}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r6+30000000}) setsockopt$IP_VS_SO_SET_EDITDEST(r5, 0x0, 0x489, &(0x7f0000000800)={{0x0, @loopback, 0x0, 0x0, 'nq\x00', 0x0, 0x0, 0xd}, {@dev, 0x0, 0x1}}, 0x44) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000040)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendfile(r3, r4, &(0x7f0000000040), 0xc24fc60) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/policy\x00', 0x0, 0x0) io_setup(0x9, &(0x7f0000000180)) fstat(r2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) getgroups(0x0, 0x0) socket(0x0, 0x2, 0x0) lseek(r2, 0x0, 0x3) syz_open_dev$loop(0x0, 0x7, 0x0) 15:00:45 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x4000, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x4) ioctl$FICLONE(r5, 0x40049409, r6) pread64(r4, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) 15:00:45 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:46 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) sendmmsg$sock(r1, &(0x7f00000019c0)=[{{&(0x7f0000000100)=@ethernet={0x306, @broadcast}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)="87ec1cd196d3c13ca1df968724458a2757c4726785cc23cfe989c48a6062fd07d445a3f5204d47464152ca6a46c6443cea1b6487fd752d7883dc1451c31245c5e6a9c057a96d", 0x46}, {&(0x7f0000000200)="5ed16b29c9d22072bdcd5824ea9d505949e7dfe16f5fdc39e73c22a6a651ed444ae6f126db8393f95ca3ff11e7510317a99a9cb9377251d93ac7dc0829d0904e29c85a49dcf8d715fdcae8bf55", 0x4d}, {&(0x7f0000000280)="2de960e6bee423c8efddb922436666dff3c0f3d769fc527fa7246780aa54bb2c5895fd756518cb19c626fa778920584cc0ceec895e08e9d61c84d58e6dca2a5bb91557bf2ec32666760c24033c867ee8cde7f608498be51fd0884e0a8b1363e80dfcffafadade56332a0964c41fe60433d4af91cbdda74240fe31712bc471f366b75be732bf5925551bd99faec77e73180ff7768c85b7ccbbbdce220e577e43ae785169a59c07001f24e1a509ede2680b376828eb3a45bfb903ed8f1bfc826", 0xbf}, {&(0x7f0000000340)="308e3fa2e6c4898d3d7a7b3e04948852cff001983a2555e9c6086cac44118f497bfdf602ae8ab5fd9adfa5cbec237767c67a8f754d9669df04772f9f9cd501ffdf212dfde83cf20630877d41491a82161cfffbc3a894cf824e015d6e24013619c73b010877231347d0bd1c8acdb8e26b09", 0x71}, {&(0x7f00000003c0)="305b44f5ab5e268a2bac83af2b0fe43a24e0f70cb8d8b4ab3e68db598fca08ad752af9de5269aded6698c1c7b1b238e37836cd4e2fe2a7d5212560ac72f5a49492ff0043bf72e7fedb96cfb6b1ab77b187a24a77a0b5f13a87f8332a8567c77f4987a4ab609d4fe0dca58dc3322b35ee3acc7080d7f7b8f63ee2bcbffb9f4b8c9cb188f4c522dd5b0f3b1bfa2c481861d4acb2fb6a069df396761867f9ab37f0120a9d4a288d5912b332ee086c80c84b09134fb3ee97dcfa8f424233eccaee3cfa100d1e4fc838c92ad8bf555cf756c089710455ecfaa76c29a8f44d6fa50a4b2b1a25ce9b920161f88b5ed7fd90d0f129f452", 0xf7}], 0x5, &(0x7f0000000540)=[@mark={{0x10, 0x1, 0x24, 0x4}}, @mark={{0xfffffec3, 0x1, 0x24, 0x13d}}, @mark={{0x10, 0x1, 0x24, 0x79}}, @txtime={{0x14}}], 0x44}}, {{&(0x7f0000000600)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'eql\x00'}}, 0x80, &(0x7f0000000800), 0x2, &(0x7f0000000840), 0x10}}, {{&(0x7f0000000880)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000900)="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", 0x1000}], 0x1, &(0x7f0000001940)=[@timestamping={{0x10, 0x1, 0x25, 0x6}}, @timestamping={{0x0, 0x1, 0x25, 0xfff}}, @txtime={{0x14, 0x1, 0x3d, 0x4}}, @mark={{0x10, 0x1, 0x24, 0xe5c1}}], 0x44}}], 0x3, 0x84) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="0f4dffffffffffff"], 0x8) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000680)) sendmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="03ffffffff1a550d4b000000a6486a972c2a84f36d7a6c7417ec3019bdd5191a3ef8d25b1a072d"], 0xc}, 0x0) 15:00:46 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x202000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x1800c1) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000300)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000380)=0x400000) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) r6 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000001c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4000000004e24, @local}, 0x10) connect$inet(r6, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) truncate(&(0x7f00000000c0)='./bus\x00', 0x800) r7 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r8 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r9 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r9, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r8, r9, 0x0, 0x20000102000004) sendfile(r6, r9, 0x0, 0xffffffff80000001) lseek(r1, 0x0, 0x2) sendfile(r1, r7, &(0x7f0000000040), 0x8000fffffffe) sendfile(r1, r7, 0x0, 0xa5cc554) openat$pfkey(0xffffffffffffff9c, 0x0, 0x42602, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) gettid() ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000940)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) 15:00:46 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0xcc442, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x10000, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) gettid() socket$inet6(0xa, 0x400000000001, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) mkdir(&(0x7f0000000180)='./control\x00', 0x0) mknod$loop(&(0x7f0000000040)='./control/file0\x00', 0x0, 0xffffffffffffffff) rmdir(&(0x7f00000004c0)='./control\x00') unlinkat(r4, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r5, 0x4c01) r7 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r7, r8, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r7, 0x4c01) ioctl$LOOP_GET_STATUS64(r7, 0x4c05, &(0x7f0000000240)) r9 = socket$inet6(0xa, 0x3, 0xfd) connect$inet6(r9, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) set_robust_list(&(0x7f0000000200), 0xc) setsockopt$inet6_opts(r9, 0x29, 0x3b, &(0x7f0000000500)=ANY=[@ANYBLOB="6deb0d8bf20000000000bb1b6f90a2d2562537037f12f29ee10c0a99689acd940a8e7fafdb91b35712b7c03977332cb2ea2a9e9133fd738161171ddf780fcce0b1f8f113e146e726fd2d4425d029e3958b6a00ddeecdfe53ba447ccd0029f9b4d8a82043f68e533b0e9e09000000fecdb6b9760000000000"], 0x1) sendmmsg(r9, &(0x7f00000092c0), 0x4ff, 0x0) 15:00:46 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) creat(&(0x7f0000000140)='./file0\x00', 0xa) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lstat(&(0x7f0000000240)='./bus\x00', &(0x7f0000000340)) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000040)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c3\xfdk\xef\x8d\x13$\xd8\x04\a\x01Q|\xde\xd0\x86\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 15:00:47 executing program 1: r0 = gettid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) syz_genetlink_get_family_id$fou(0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000), 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x399) r4 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000001100)=""/4096) fstat(r4, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x399) fstat(0xffffffffffffffff, &(0x7f00000006c0)) fchown(0xffffffffffffffff, r5, 0x0) ftruncate(r3, 0x2007fff) syz_open_procfs(r0, &(0x7f0000000180)='coredump_filter\x00') pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x12) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000880)={'\xe2\x03\x00', 0x0}, &(0x7f0000000340)="9062e73cedbe844bdda8570833395d493a1aac3238b7a34f24f9cd39785d5c237073dafde77ef5a1a9e66dc63ae928a440f243c0b131eb6d46353333b4e7446200000000000000", 0x47, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="7e8125256547cf5b9a38e9e1795ad495bdb487da683c912a658d784339a0ffe8b7b67e9ca4d7d2754bd0ea2bbb96615c3d9296fefce24e08909f00d397ef359867f4bcef53d3a47853e7af5d0328209ad73224000000000000000000000000000000000000000000850576cab6419dd44c143a56fdce000000000000"], 0x0, 0x0, 0x8000, 0x0) write(r7, &(0x7f00000001c0), 0xfffffef3) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) timer_gettime(0x0, &(0x7f00000003c0)) sendfile(r1, r3, 0x0, 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x6, &(0x7f0000000040)={0x0, 0x0}) nanosleep(&(0x7f0000000100)={r8, r9+10000000}, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, r7, 0x0) 15:00:47 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:47 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:47 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xc) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000840)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000640)={@dev={0xfe, 0x80, [], 0xd}, 0xf, r3}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', r3}) r4 = dup(r0) ioctl$UI_DEV_CREATE(r0, 0x5501) write$FUSE_DIRENTPLUS(r4, &(0x7f0000001600)={0x160, 0x0, 0x0, [{{}, {0x0, 0x0, 0x9, 0x0, 'ppp1wlan1'}}, {{}, {0x0, 0x0, 0xc, 0x0, '/dev/uinput\x00'}}]}, 0x160) 15:00:47 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, 0x0, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:47 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000380)={0x4, 0x1f, 0x3, 0x12000000, 0xea, "f1a2c58cac7b90f916d7f28de792593063c5dd", 0x800, 0x20}) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000480)={0xa, 0x0, 0x0, @dev}, 0x1e1) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$TIOCSSERIAL(r2, 0x541f, &(0x7f0000000100)={0x101, 0x3, 0xffffffff, 0x3, 0x3, 0x3, 0x6, 0x3, 0x75db, 0x1, 0x5, 0xd60, 0x5, 0x7ff, &(0x7f0000000040)=""/65, 0xfe00, 0x8000, 0x3ff}) keyctl$join(0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x22a) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000500), 0x4) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000240)={0x2, 0x5, 0xffffffffe8c40d75, 0x6, 0x80, 0x1}) write$uinput_user_dev(r4, &(0x7f00000004c0)={'syz1\x00', {0x800, 0x1, 0x3, 0x3}, 0x1e, [0x4, 0x0, 0x51, 0x10001, 0x9, 0x1f, 0x5, 0xbc24, 0xffff, 0x6, 0x8, 0x0, 0x9, 0x8, 0x7, 0x0, 0x0, 0x80000001, 0x101, 0x8000, 0x8000, 0x200, 0x2, 0x0, 0x200, 0xe096, 0x3, 0x40, 0x6, 0x200, 0x2, 0x0, 0x7, 0x7fff, 0x40, 0x6, 0xfffffffb, 0xfffffffc, 0x8, 0x8000, 0x20, 0x0, 0x5, 0x4, 0x0, 0x5, 0x20, 0x9, 0x74, 0xfff, 0x80000001, 0x45, 0x4, 0x7fffffff, 0xbd, 0x81, 0x6, 0x8616, 0x8, 0x7000000, 0x800, 0x1, 0xa12, 0x4], [0x3, 0x0, 0x7, 0x1, 0x7cc, 0x10001, 0x0, 0x200009, 0x1, 0x80, 0x0, 0xfff, 0x1, 0x8, 0xebf, 0xd4b, 0xe2e, 0x0, 0xfff, 0x7, 0x9, 0xacf4, 0x8, 0x0, 0x9, 0x8, 0xd8, 0x20, 0x9, 0xed, 0x8, 0x3, 0x3, 0xac3, 0x20, 0x101, 0x0, 0xfff, 0xfffffffc, 0x7fff, 0x7, 0x2, 0x6ae8, 0x800, 0x1, 0x80, 0x9, 0x10000, 0x1, 0x4, 0x2, 0x1, 0x9, 0x1, 0xffffffff, 0x80000000, 0x9, 0x8, 0x7, 0x98cf, 0xcd0, 0x7, 0x101, 0x95], [0x180, 0x9, 0x2, 0x2, 0xae8, 0x2, 0x1, 0x20000000, 0x7, 0x3, 0x5, 0x2, 0xfffffff8, 0x1, 0x40, 0x8, 0x4, 0x8, 0x7, 0xcf, 0x71e, 0x6, 0x800, 0x7ff, 0x2, 0x200, 0x10000, 0x4800000, 0x2, 0x0, 0x1, 0x202, 0x36, 0xfffffffb, 0x20, 0x8, 0x2, 0x4, 0x40, 0x0, 0x5, 0x3, 0x8, 0x8000, 0x6a61dc5e, 0x8001, 0x1ff, 0xfffffffc, 0x9, 0x200, 0x7, 0x0, 0x101, 0x9, 0xd34, 0x3f, 0x7, 0x2, 0x9, 0x3, 0x3, 0x3d78, 0x0, 0xae], [0x4, 0x0, 0x89, 0x8, 0x3f, 0x8001, 0x3f, 0xffffffff, 0x0, 0x5, 0x1ff, 0x9, 0x3, 0x5, 0xe5, 0x5, 0x0, 0x5, 0x5f, 0x8, 0xd84, 0x100, 0x6, 0x8001, 0xfffffff8, 0xb9, 0x30, 0xffffffc0, 0xfb6, 0x8, 0xdd9, 0x5, 0xfff, 0x4, 0x5, 0x9, 0x4, 0x9, 0x80004, 0x1, 0x4, 0x4, 0x4, 0x4, 0x4, 0x20, 0x2, 0x7ff, 0x4, 0x4, 0x8, 0xfffff071, 0x8, 0xffff, 0x400, 0x7, 0x870, 0x6, 0x0, 0x7fffffff, 0x0, 0xffff, 0x3, 0x9]}, 0x45c) r5 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r5, r6, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r5, 0x4c01) r7 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r7, 0x80084503, &(0x7f0000001100)=""/4096) r8 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r9 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r9, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r8, r9, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r8, 0x4c01) r10 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r11 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r11, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r10, r11, 0x0, 0x20000102000004) r12 = socket$packet(0x11, 0x3, 0x300) r13 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCGREP(r13, 0x80084503, &(0x7f0000001100)=""/4096) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000940)={0x2400000000000, 0x1, 0x7, 0x0, 0x0, [{r7, 0x0, 0x1000}, {r0, 0x0, 0x1}, {r8, 0x0, 0xb36}, {r11, 0x0, 0x3}, {r3, 0x0, 0x6}, {r12, 0x0, 0x1892}, {r13, 0x0, 0x3}]}) [ 994.023854] input: syz1 as /devices/virtual/input/input63 15:00:47 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:47 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, 0x0, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "875e950ba9c95ae5c0378c2e75c9488acc39f558ec729f0ad0b8bb887286aef291eb32133abb186fad28721f70592c9c1ff5007aeed207e7952a47da591431e5", "9632d436d48f41d33bcd0d2d61a9b711cac800fc65a8424850f9e7dfff0c8ccb1281fca8f526cf04d51a284eb24c3fb7ccb8b742195f619737bfd85cd89667a9", "dcd436fa5644be1649cca39a21623a22c8389128121e385cc14b9a426765a7bd"}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="77721a3c02", 0x5}], 0x1}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x60, &(0x7f0000000080)={0x0, @local, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x1100}, 0x2c) 15:00:47 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0xffffffffffffff8f) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000500), 0x3528acda}], 0x20000000000002d7, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, 0x0}}], 0x1, 0x0, 0x0) creat(0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) readahead(r3, 0x3, 0x8) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x8) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') fsync(r4) pwritev(r4, &(0x7f0000001400), 0x31f, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 15:00:48 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000140)=0xffff, 0xfffffffffffffea0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 15:00:48 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000140)=0xffff, 0xfffffffffffffea0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) [ 994.942110] input: syz1 as /devices/virtual/input/input64 15:00:48 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, 0x0, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:48 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000), 0xffffffffffffff8f) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000500), 0x3528acda}], 0x20000000000002d7, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{&(0x7f0000002040)=@generic, 0x80, 0x0}}], 0x1, 0x0, 0x0) creat(0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) readahead(r3, 0x3, 0x8) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x8) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/sockcreate\x00') fsync(r4) pwritev(r4, &(0x7f0000001400), 0x31f, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 15:00:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x80000002, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x104) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/context\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080)=0x80, 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) lseek(r5, 0x0, 0x2) openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x802, 0x0) sendfile(r5, r6, 0x0, 0xfffffffffffffff9) sendfile(r5, r6, &(0x7f0000000040), 0x8000fffffffe) mkdirat(r3, &(0x7f00000001c0)='./file1\x00', 0x180) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00@\x00\xdd\xa8>\xbc\x89\x01(4\xbdfx\xb6tQ-n\xde\xd0 \xba.Qf\x97E\xa9\x85\xba\x884L\x18\xf4\xa1\xeao\x16\xae\x85Qx)\x15%\x12\xa9\xeb') r8 = openat$cgroup_ro(r7, &(0x7f0000000140)='mem\x00\x01y/\x06\x00\x00\x00\x00\x00\x00\x00\x16\xd4B\xab\xe3\xfarent\x00', 0x0, 0x0) setrlimit(0x8, &(0x7f0000001240)={0x1, 0x4}) getuid() lstat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000500)) lstat(&(0x7f0000000580)='./bus\x00', &(0x7f00000005c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, &(0x7f0000000740)) mount$fuseblk(0x0, &(0x7f00000003c0)='./bus\x00', 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) preadv(r8, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x32a5449}], 0x340, 0x2000107c) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 15:00:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000500)=""/70) fchdir(r0) r3 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) write$P9_RREADDIR(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="7a000000200800000067090000000000000000080000000200000000000000000000000700004200000000df843c55104331c8f73572bd49039d71de8590f277292ee786e5814654b1d85a05002e2f627573080040000002000000000000000400000000000000070000040300000004000000000000000001001065b4772c6bb15e00000000000005002e2f627573000055103fbb2300354a73124d6c945507e5a90a0af85d445b342309ff0254c0aca663f10fee521e34250638434f6ab3c3a82a0656bf487c13a38c4759f0c43f"], 0xcf) read(r0, &(0x7f0000000280)=""/124, 0x7c) fsync(r4) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00') getdents64(r5, &(0x7f0000000040)=""/235, 0xeb) getdents(r5, &(0x7f0000000ea9)=""/407, 0x197) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB="000000090032000000391c8eac47cbab34bbddc541429310f800"/38], 0x1}}, 0x20000000) ioctl$PIO_FONT(r0, 0x4b61, 0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket(0x8, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000080)) r7 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r8 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x151000) ioctl$LOOP_SET_FD(r8, 0x4c00, r7) creat(&(0x7f0000000580)='./bus\x00', 0x0) r9 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r10 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r11 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r11, 0x4c00, r10) r12 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r13 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r13, 0x4c00, r12) r14 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r15 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r15, 0x4c00, r14) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="54726f637b3412d7a31ac5a331bb1e21bacaaaeb139ae44ef53ecf467782468f957d1788f2ecaaa1dfec", @ANYRES32=r7, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYPTR64, @ANYRES64=r1], @ANYRES64=r9, @ANYRES64, @ANYBLOB="c95415ecd7dd00555ac06cec518171510f64c187861865ac1435dab40434805e34b1cae3ef83a8b0a6"], @ANYRES16, @ANYRES32=0x0, @ANYPTR=&(0x7f0000000740)=ANY=[@ANYRES16=r15, @ANYRES16=0x0, @ANYRESOCT=r6, @ANYBLOB="472d7f3016ee9877dded1415c8dfd45a5e175ade045fe02529a8cfccb5b7ca932318ae8fa43e56d7a54875a1a11d9b68a5ade4056ab62ca453da063cd392c597f0d7535f3e3837c8459994a46a813731aa0bcf7a6437256827f2a75c6164c60d65dac0b60846d1627ee12997f05e16a34aae125daeddb63bd69d9a26d774ca855c5834e9"], @ANYRESDEC, @ANYPTR64, @ANYRESOCT, @ANYBLOB="6774f2652c8c31c501c8ee953f1ecfe49106aed7fd5cf37ea5ad7985de8a0fbaad9e2bb1bc5ff9f5c87a1faad44eeac00cd358275894d194b2188100000000000000c237ea6f9917a04894c333256a749a7097ee879e3e3c178d6754910f1f098d5554c554107a1dc19a61b6a1d4c6d84a6050dc15bc8a4a9d0ca73a50395864cea8d2da30a5b88dd0d5e3d677629c045e4073", @ANYRESDEC=r13], 0xfeec) sendfile(r6, r2, 0x0, 0xcd) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000700)={'bcsh0\x00', {0x2, 0x0, @local}}) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x2400, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) signalfd4(r4, &(0x7f0000000380)={0x101}, 0x8, 0x80000) 15:00:48 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000001c0)={'veth0_to_bond\x00', {0x2, 0x4e22, @broadcast}}) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000683ff4)={@multicast1, @loopback}, 0xc) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000540)={&(0x7f0000001840)=ANY=[@ANYBLOB="3c01007b3365d9abdfea5a8fac9fdf72ab2f42ba01743959604c8504f538e8b51b1879989891cf9ee4929079dc610d6d9361b8d05c94aaa833119d9e1e0ed2e4ed1a3d00098dc313edb2dedf015ffaf15704c19d2e371b3855b35b1630562cc876a75067cbdf50be71c96883004735db07cc6af7d694000000000000", @ANYRES16=r5, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x4010}, 0xe534b7f00548a2e1) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="f8000000", @ANYRES16=r5, @ANYBLOB="00022dbd7000ffdbdf25100000003800060004000200080001000600000004000200080001000100000004000200080001000900000008000100740000000800010000000000100007000c0004000000000000000000240007000c000300060000000000000008000200ffffff7f0c00030008000000000000002400040014000700080001000900000008000400000040000c00010073797a31000000001c0004000c00010073797a31000000000c00010073797a31000000002c000700080001000000010008000100170b00000c00030009000000000000000c00030002000000000000000c0005000800010075647000"], 0xf8}, 0x1, 0x0, 0x0, 0xc0}, 0x4) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f0000000180)=@req3={0x7ffe, 0x3, 0x6, 0x7e, 0x8, 0x2, 0x2}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICE(r6, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000140)=0x60) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) flock(r2, 0x0) dup2(r0, r1) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r7, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f00000007c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB='h\x00\x00', @ANYRES16=r8, @ANYBLOB="000426bd7000ffdbdf25010000000000000008410000004c001800000002696200005367a5bbdb342d0000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000f588238c000001000000000000009d116bf4c545ce1f7d964b4826f40e31a77d5450b3158b94ffd431d283757475b1794deedfaa86db7ce0dbf942b35704cbeacf6020d198d7332448de1fe1224945fc9de7fbf41c4b18d6977dc43a162fe5669f1c4d28a69740a7476288374649637c2d64523482a16690e2d1bbdf2fa6302cb6f18c3add46beefc4f61106802a1689ecf3778999067df50b8382403d07f55249357583352764f8fd96842aeda574a18ecd33da78f37fdd970bb3fee5644947efbbbc17b9d630d90b0a289c8bc8abfce49c38d2dcc9d524fd516dee8ae4bbf3f759a357305338f916522686d6d934943d6b98caa19238814d044dc246a8c4419e9bb7000674829ea4cfe2fc886e063cb63a852a9d0a46b8394a672724e1ba4565cbd4e568a693c218dbf451c2e4409636235051b5352bb886dc9f9b897a754fad8b01050ad4e835d7d46a108a96a977f489a7908d67b8c7aad811b34db7104a5d7430716a7cae384250574db9d8940643a78a79c9645ef2e3779dccc2259e31bbacbe3d034b7cc439081921e6dceb1a12b2f909d78bff2449ef06c276df50f5e5af017824938f1b3d40c64aef7c01db524b23a5649f4912698167e8c884ffbfab9f39ae2c7313d242456873df7139e89038d2eff71b50eae4242b48763496acf3edf64802224f81c028dc96b652ad2db7f585de9247e3c21fe6b7aca5b937a6db1b4f1b449d5cc04a748c87ef8ebdc2b03b36f2bf4249b911c9e5b42d97a46c0f0cbb24a2e82815e76afe4ee482a068e5515c6cd89137588b9c0a132e949d5149f3bffc40df7aebd14307cfc602c3179604df05bab94d39cee3fe0c5b000000d903e18f856ee6af76c97bf56207d95483975bc80b65a32a7aaadc5f95f4e849c71709a20c9eedd74f5d0f60c252ef19a5a86ceb5aa0c38e62b0979e2429a085a01f9c17c45cf32cb3b0b8114f702f02302b0d3605f403b6dc90c64754e4ac034e4266f7d8552ee3f5774666"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x40) sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r8, 0xc112d173116108ad, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44050}, 0x800) open(0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) dup3(r0, r2, 0x0) 15:00:49 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:49 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:49 executing program 1: r0 = open(&(0x7f00000003c0)='./file0\x00', 0x80, 0x0) openat$cgroup_ro(r0, &(0x7f0000000340)='pids.events\x00', 0x0, 0x0) pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, 0x0) write(r2, &(0x7f00000001c0), 0xbab230cf) ppoll(0x0, 0x0, 0x0, &(0x7f0000000580)={0x2}, 0x8) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$notify(0xffffffffffffffff, 0x402, 0x180000020) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = gettid() rt_tgsigqueueinfo(0x0, r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="8d94b2a9b7211ad9583a163d380772d8", 0x4}, 0x1c) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000100)={{0x2, 0x0, @identifier="8a6cd91577cf1c4bf10626f09174bc6c"}}) pipe(&(0x7f0000000140)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1ef) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) syncfs(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='rose0\x00', 0x10) getuid() sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ustat(0x1, &(0x7f00000004c0)) syz_open_dev$mice(&(0x7f0000000600)='/dev/input/mice\x00', 0x0, 0x100) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x2}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x23, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) 15:00:49 executing program 3: r0 = memfd_create(0x0, 0x6) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000002c0)={0x0, @dev={0xac, 0x14, 0x14, 0x13}, 0x4e24, 0x2, 'none\x00', 0x10, 0x0, 0x2036}, 0x2c) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xffffffe0) read(r3, &(0x7f0000000200)=""/250, 0xfffffffffffffef6) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000003c0), 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) r5 = socket$inet6(0xa, 0x400000000001, 0x0) quotactl(0x8, &(0x7f0000000100)='./bus\x00', 0x0, &(0x7f0000000500)="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") close(r5) socket$netlink(0x10, 0x3, 0xa) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f00000001c0), 0x4) r6 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x8000ffffffff) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) ioctl$sock_ifreq(r2, 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0xfffffffffffffffb) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4, 0x0) ftruncate(r0, 0x6) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffcb4) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0xec38ed91f9c7494a}) write$binfmt_misc(r5, 0x0, 0x0) 15:00:49 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sync() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x1, 0x70bd2a, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40850) socketpair$unix(0x1, 0x0, 0x0, 0x0) sync() ppoll(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) syz_genetlink_get_family_id$net_dm(&(0x7f00000005c0)='NET_DM\x00') sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x8) write$FUSE_NOTIFY_INVAL_INODE(r6, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x0, 0xbac, 0x3}}, 0x28) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000001c0)=0x101) 15:00:49 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:49 executing program 0: socket$key(0xf, 0x3, 0x2) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) pipe2(&(0x7f0000000500), 0x4000) open(&(0x7f0000000540)='./file0\x00', 0x381200, 0x80) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/mls\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) sendmmsg(r0, &(0x7f0000007fc0), 0x5654807, 0x0) unshare(0x40040000) syz_extract_tcp_res(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000a80)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r3 = dup(r2) r4 = socket(0x4000e, 0x8000000000004, 0x5) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r4, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000026bd7000fedbdf250500003b392b000800060000000000080005004700000008000500008000000800060000"], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x20044014) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB="09000002", @ANYRES16=r5, @ANYBLOB="000226bd7000fbdbdf250100000008000400a502000008000600040000004c00010008000800d6050000140003007f0000010000000000000000000000000800020092000000080009006f00000014000300000007ff000000000000000000000000080004004e220000"], 0x70}, 0x1, 0x0, 0x0, 0x40804}, 0x4044101) r6 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r6) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r6) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r6) clone(0x20000000, &(0x7f0000000500), 0x0, &(0x7f00000005c0), &(0x7f0000000600)) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RLOPEN(r7, &(0x7f0000000380)={0x18, 0xd, 0x2, {{0x1, 0x1, 0x5}, 0x80000001}}, 0x18) statfs(0x0, &(0x7f00000004c0)=""/20) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) pwrite64(r2, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000180)) 15:00:50 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:50 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:50 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:50 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000700)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000500)="00abe6d29e6101cb8b41eea5cf2e67fea541e9b7b65fe42e517d5f81d2919e1b2f4cf7f77a16fc3e961a0847916c7c2d9b77cd3160567341263cf19b3b2c6177e7065dda850c756c06aede12e9da8118bb5464ad07fa6146f6903ee57345cbd7551f547bdbe947b4f9a0b28cf29a28eda534fc6e2c9bf2c36c87da9ad79e6e7090", 0x4202692d7f740df1, 0x4000801, 0x0, 0xfffffffffffffeda) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) recvfrom$inet(r0, &(0x7f0000000440)=""/98, 0x7cd97198ffceeca1, 0x0, 0x0, 0xffffffffffffffae) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x4000) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x100081) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendfile(r2, r3, 0x0, 0x20000102000004) ioctl$LOOP_CLR_FD(r2, 0x4c01) splice(r0, 0x0, r2, 0x0, 0x0, 0xd) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = creat(0x0, 0x0) ppoll(&(0x7f0000000700)=[{}, {r4}, {0xffffffffffffffff, 0x360}, {r5, 0x10}], 0x4, 0x0, 0x0, 0xfd74) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000280)) r7 = creat(0x0, 0x0) ppoll(&(0x7f0000000700)=[{}, {}, {0xffffffffffffffff, 0x360}, {r7, 0x10}], 0x4, 0x0, 0x0, 0x0) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) connect$inet(r6, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'lo\x00', 0x101}) read(r0, &(0x7f00000001c0)=""/244, 0xffffff52) 15:00:50 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:50 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40246608, &(0x7f0000000140)={0xfffffffffffffff8, 0xffffffffffffff01, 0x0, 0x6, 0xffff, 0x2}) ioctl$TIOCCONS(r1, 0x541d) r2 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r2) keyctl$set_timeout(0xf, r2, 0x7) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f00000000c0)={0x6, 0x6}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x80000) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f0000000080)={0x0, 0x7530}, 0x8) 15:00:51 executing program 1: open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(r1, &(0x7f00000001c0), 0xbab230cf) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) gettid() connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(r3, &(0x7f00000001c0)=[{&(0x7f0000000540)=""/153, 0x99}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000280)=0x40) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000000400)=""/165) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, 0x0, 0x1000000ea) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) keyctl$join(0x1, &(0x7f0000000180)={'syz'}) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) syncfs(0xffffffffffffffff) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x4000) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.stat\x00', 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f00000001c0)={0x0, 0x2, 0x200000000}) socket$netlink(0x10, 0x3, 0x0) 15:00:51 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 997.848459] device lo entered promiscuous mode 15:00:51 executing program 3: socket$inet(0x10, 0x2, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/rt_acct\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) capset(&(0x7f0000000000)={0x20071022}, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffe}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) creat(&(0x7f00000001c0)='./file0\x00', 0x80) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x203, r1) openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000340)={0x3da}, 0xfffffffffffffd27) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x80, 0xffffffffffffff58) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r3 = memfd_create(&(0x7f0000000140)='/dev/loop#\x00', 0x0) sendfile(r3, r2, 0x0, 0x2000005) read(r3, &(0x7f00000005c0)=""/193, 0xc1) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r4) r5 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) r6 = open(&(0x7f0000000000)='./bus\x00', 0x2530c0, 0x24) r7 = socket$unix(0x1, 0x5, 0x0) lseek(r5, 0x100000000000000, 0x2) sendfile(r5, r6, 0x0, 0xfffffffffffffffc) sendfile(r5, r6, &(0x7f0000000040), 0x8000fffffffe) getsockopt$sock_buf(r7, 0x1, 0x10000000000001e, &(0x7f0000000380)=""/87, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x180) syz_open_procfs(0x0, 0x0) 15:00:51 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000140)={0x80000001, 0x7f, [0x80, 0x800, 0x0, 0x28, 0x1], 0x9d2}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) linkat(r1, 0x0, r2, &(0x7f00000006c0)='./file0/file0\x00', 0x1400) fchdir(r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000400)) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000500)) getsockname(r2, 0x0, &(0x7f0000000680)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) fchdir(r3) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) r4 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x800000000000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000540)={{{@in=@initdev, @in6=@remote}}, {{@in=@multicast1}}}, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f00000000c0)=0x10000) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) lseek(r4, 0x20000010000, 0x0) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000040)={0x0, 0x1, 0x3, 0x8}) 15:00:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) connect$inet(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) 15:00:52 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:52 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:52 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:00:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xe002) io_setup(0xc32f, &(0x7f0000000440)) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) epoll_create1(0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r4, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r4, 0x0) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) creat(0x0, 0x80) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) ftruncate(0xffffffffffffffff, 0x48280) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) 15:00:52 executing program 0: r0 = socket(0x18, 0x2, 0x0) r1 = socket(0x1f, 0x5, 0x0) dup2(r0, r1) 15:00:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x14) wait4(0x0, 0x0, 0x0, 0x0) 15:00:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000240)=@builtin='builtin_trusted\x00') keyctl$clear(0x1d, r0) 15:00:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r2, &(0x7f00000009c0)="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", 0x48b, 0xc001, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000280)="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", 0x122, 0x400c020, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200)=0x3, 0x4) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000580), 0x4) 15:00:53 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x18, 0x0, 0x3) r3 = socket(0x18, 0x0, 0x3) dup2(r2, r3) 15:00:53 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x0, 0x2}, 0x20) 15:00:53 executing program 4: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xfffffffffffffd2f}}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'ip_vti0\x00', @ifru_flags}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x400000000000259, 0x0) 15:00:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0xfff6) socket$inet6(0xa, 0x0, 0x0) 15:00:53 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4000000004, &(0x7f0000000080)="441f07638d0000000000000e6d0000b69c14bbf1a236b160ba6b3abe0f", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f00000001c0)=0x11) 15:00:53 executing program 0: r0 = geteuid() read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/18, 0x12) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) setfsuid(r0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:00:53 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 15:00:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSID(r1, 0x5429, 0x0) 15:00:56 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.nlink\x00', 0x0, 0x0) 15:00:56 executing program 4: r0 = socket(0x10, 0x802, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040)="fc00000048000702ab092500090007000aab6100000000000000e293210001c0000000000000000000000cff0000000000001ec28656aaa79bb94b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf1587c3b41", 0xfc) 15:00:56 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:56 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 15:00:56 executing program 1: r0 = socket$inet(0xa, 0x801, 0x0) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) 15:00:56 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$nl_generic(0x10, 0x3, 0x10) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = creat(0x0, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f0000000500)=0x6, 0xffffffffffffff95) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) r3 = gettid() wait4(0x0, 0x0, 0x60000000, 0x0) r4 = creat(0x0, 0x0) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000500)=0x3, 0x4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 15:00:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) pwritev(r0, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x18) 15:00:56 executing program 0: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x10000, 0x6}, {0xffffffff00000000}]}, 0x14, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000640)='wlan1\x00'], &(0x7f0000000780)=[&(0x7f0000000540)='w\x85an1\x00', &(0x7f00000002c0)='proc\x00']) 15:00:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x8, 0x121400) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x6, 0x2, 0x8, 0x8, 0x0, 0x0, 0x4011, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x400, 0x0, @perf_config_ext={0x18000000, 0x800}, 0x11647b79bea33e6d, 0x6, 0x6, 0x8, 0xcc, 0xb0e3, 0xff}, r1, 0x8, 0xffffffffffffffff, 0x2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) sched_setaffinity(r2, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x100004) 15:00:56 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:00:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x11b2, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/4530], 0x0) [ 1002.916854] [ 1002.918554] ====================================================== [ 1002.924861] [ INFO: possible circular locking dependency detected ] [ 1002.931447] 4.4.174+ #17 Not tainted [ 1002.935153] ------------------------------------------------------- [ 1002.941552] syz-executor.1/6528 is trying to acquire lock: [ 1002.947166] (_xmit_NETROM){+.-...}, at: [] sch_direct_xmit+0x238/0x700 [ 1002.956575] [ 1002.956575] but task is already holding lock: [ 1002.962622] (&(&q->lock)->rlock){+.-...}, at: [] ipv6_frag_rcv+0x6cc/0x51e0 [ 1002.971937] [ 1002.971937] which lock already depends on the new lock. [ 1002.971937] [ 1002.980258] [ 1002.980258] the existing dependency chain (in reverse order) is: [ 1002.988066] -> #1 (&(&q->lock)->rlock){+.-...}: [ 1002.993462] [] lock_acquire+0x15e/0x450 [ 1002.999749] [] _raw_spin_lock_irqsave+0x50/0x70 [ 1003.006723] [] try_to_wake_up+0x2b/0x1110 [ 1003.013177] [] wake_up_process+0x15/0x20 [ 1003.019538] [] pool_mayday_timeout+0x3b2/0x4e0 [ 1003.027214] [] call_timer_fn+0x18d/0x850 [ 1003.033581] [] run_timer_softirq+0x51f/0xb70 [ 1003.040289] [] __do_softirq+0x226/0xa3f [ 1003.046743] [] irq_exit+0x10a/0x150 [ 1003.052681] [] smp_apic_timer_interrupt+0x7e/0xb0 [ 1003.059843] [] apic_timer_interrupt+0x9d/0xb0 [ 1003.066646] [] pipe_read+0x274/0x860 [ 1003.072666] [] __vfs_read+0x2e5/0x3c0 [ 1003.078763] [] vfs_read+0x134/0x360 [ 1003.084704] [] SyS_read+0xdc/0x1c0 [ 1003.090542] [] do_fast_syscall_32+0x32d/0xa90 [ 1003.097338] [] sysenter_flags_fixed+0xd/0x1a [ 1003.104050] -> #0 (_xmit_NETROM){+.-...}: [ 1003.108912] [] __lock_acquire+0x37d6/0x4f50 [ 1003.115542] [] lock_acquire+0x15e/0x450 [ 1003.121988] [] _raw_spin_lock+0x38/0x50 [ 1003.128259] [] sch_direct_xmit+0x238/0x700 [ 1003.134814] [] __dev_queue_xmit+0xd24/0x1bb0 [ 1003.141528] [] dev_queue_xmit+0x18/0x20 [ 1003.147807] [] neigh_resolve_output+0x4a0/0x7a0 [ 1003.154785] [] ip6_finish_output2+0x9c7/0x1dc0 15:00:56 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}], 0x1}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 1003.161666] [] ip6_finish_output+0x2f3/0x750 [ 1003.168376] [] ip6_output+0x1b4/0x520 [ 1003.174475] [] ndisc_send_skb+0x98d/0x1110 [ 1003.181017] [] ndisc_send_ns+0x4bf/0x6b0 [ 1003.187375] [] ndisc_solicit+0x2b2/0x440 [ 1003.193750] [] neigh_probe+0xc8/0x100 [ 1003.199861] [] __neigh_event_send+0x2ab/0xc50 [ 1003.206674] [] neigh_resolve_output+0x5ec/0x7a0 [ 1003.213670] [] ip6_finish_output2+0x9c7/0x1dc0 [ 1003.220564] [] ip6_finish_output+0x2f3/0x750 [ 1003.227290] [] ip6_output+0x1b4/0x520 [ 1003.233397] [] ip6_local_out+0x9c/0x180 [ 1003.239676] [] ip6_send_skb+0xa2/0x340 [ 1003.245863] [] ip6_push_pending_frames+0xbb/0xe0 [ 1003.252909] [] icmpv6_push_pending_frames+0x336/0x530 [ 1003.260400] [] icmp6_send+0x1506/0x1b40 [ 1003.266672] [] icmpv6_param_prob+0x29/0x40 [ 1003.273209] [] ipv6_frag_rcv+0x3f06/0x51e0 [ 1003.279753] [] ip6_input_finish+0x57d/0x14f0 [ 1003.286473] [] ip6_input+0xf8/0x1f0 [ 1003.292407] [] ip6_rcv_finish+0x14d/0x670 [ 1003.298853] [] ipv6_rcv+0xfc1/0x1a20 [ 1003.304870] [] __netif_receive_skb_core+0x1300/0x2950 [ 1003.312378] [] __netif_receive_skb+0x58/0x1c0 [ 1003.319238] [] process_backlog+0x200/0x630 [ 1003.325785] [] net_rx_action+0x367/0xd30 [ 1003.332163] [] __do_softirq+0x226/0xa3f [ 1003.338468] [] do_softirq_own_stack+0x1c/0x30 [ 1003.345287] [] do_softirq.part.0+0x54/0x60 [ 1003.351826] [] do_softirq+0x18/0x20 [ 1003.357759] [] netif_rx_ni+0xeb/0x3b0 [ 1003.363888] [] tun_get_user+0xdbf/0x2640 [ 1003.370261] [] tun_chr_write_iter+0xda/0x190 [ 1003.376973] [] do_iter_readv_writev+0x141/0x1e0 [ 1003.383943] [] compat_do_readv_writev+0x389/0x6e0 [ 1003.391094] [] compat_writev+0xe1/0x150 [ 1003.397366] [] compat_SyS_writev+0xdb/0x1c0 [ 1003.404087] [] do_fast_syscall_32+0x32d/0xa90 [ 1003.410885] [] sysenter_flags_fixed+0xd/0x1a [ 1003.417596] 15:00:56 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) [ 1003.417596] other info that might help us debug this: [ 1003.417596] [ 1003.425731] Possible unsafe locking scenario: [ 1003.425731] [ 1003.431785] CPU0 CPU1 [ 1003.436440] ---- ---- [ 1003.441096] lock(&(&q->lock)->rlock); [ 1003.445409] lock(_xmit_NETROM); [ 1003.451626] lock(&(&q->lock)->rlock); [ 1003.458368] lock(_xmit_NETROM); [ 1003.462077] [ 1003.462077] *** DEADLOCK *** [ 1003.462077] [ 1003.468134] 9 locks held by syz-executor.1/6528: [ 1003.472877] #0: (rcu_read_lock){......}, at: [] process_backlog+0x19c/0x630 [ 1003.482377] #1: (rcu_read_lock){......}, at: [] ip6_input_finish+0x0/0x14f0 [ 1003.491905] #2: (&(&q->lock)->rlock){+.-...}, at: [] ipv6_frag_rcv+0x6cc/0x51e0 [ 1003.501765] #3: (slock-AF_INET6){+.-...}, at: [] icmp6_send+0x7bd/0x1b40 [ 1003.511017] #4: (rcu_read_lock){......}, at: [] icmp6_send+0xf44/0x1b40 [ 1003.520182] #5: (rcu_read_lock_bh){......}, at: [] ip6_finish_output2+0x1e1/0x1dc0 [ 1003.530295] #6: (rcu_read_lock){......}, at: [] ndisc_send_skb+0x779/0x1110 [ 1003.539823] #7: (rcu_read_lock_bh){......}, at: [] ip6_finish_output2+0x1e1/0x1dc0 [ 1003.549940] #8: (rcu_read_lock_bh){......}, at: [] __dev_queue_xmit+0x1d7/0x1bb0 [ 1003.559893] [ 1003.559893] stack backtrace: [ 1003.564387] CPU: 0 PID: 6528 Comm: syz-executor.1 Not tainted 4.4.174+ #17 [ 1003.571477] 0000000000000000 47dbfe97b193e8c9 ffff8801db6064e0 ffffffff81aad1a1 [ 1003.579526] ffffffff84057a80 ffff8800a580af80 ffffffff83ad51c0 ffffffff83ae4310 [ 1003.587583] ffffffff83ad51c0 ffff8801db606530 ffffffff813abcda ffff8801db606610 [ 1003.595632] Call Trace: [ 1003.598203] [] dump_stack+0xc1/0x120 [ 1003.604332] [] print_circular_bug.cold+0x2f7/0x44e [ 1003.610927] [] __lock_acquire+0x37d6/0x4f50 [ 1003.616898] [] ? check_usage+0x14e/0x5a0 [ 1003.622699] [] ? trace_hardirqs_on+0x10/0x10 [ 1003.628760] [] ? __lock_acquire+0x2c79/0x4f50 [ 1003.634907] [] ? __dev_get_by_index+0x130/0x130 [ 1003.641227] [] ? __skb_gso_segment+0x4c0/0x4c0 [ 1003.647469] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1003.654224] [] lock_acquire+0x15e/0x450 [ 1003.659854] [] ? sch_direct_xmit+0x238/0x700 [ 1003.665919] [] _raw_spin_lock+0x38/0x50 [ 1003.671547] [] ? sch_direct_xmit+0x238/0x700 [ 1003.677610] [] sch_direct_xmit+0x238/0x700 [ 1003.683497] [] ? dev_deactivate_queue.constprop.0+0x160/0x160 [ 1003.691042] [] __dev_queue_xmit+0xd24/0x1bb0 [ 1003.697101] [] ? __dev_queue_xmit+0x1d7/0x1bb0 [ 1003.703331] [] ? trace_hardirqs_on+0x10/0x10 [ 1003.709390] [] ? netdev_pick_tx+0x2f0/0x2f0 [ 1003.715534] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1003.722285] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1003.729028] [] ? memcpy+0x46/0x50 [ 1003.734127] [] dev_queue_xmit+0x18/0x20 [ 1003.739750] [] neigh_resolve_output+0x4a0/0x7a0 [ 1003.746070] [] ? ip6_finish_output2+0x9c7/0x1dc0 [ 1003.752499] [] ip6_finish_output2+0x9c7/0x1dc0 [ 1003.758739] [] ? ip6_finish_output2+0x1e1/0x1dc0 [ 1003.765144] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1003.771886] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1003.778621] [] ? ip6_forward_finish+0x4a0/0x4a0 [ 1003.784918] [] ? check_preemption_disabled+0x3c/0x200 [ 1003.791735] [] ? check_preemption_disabled+0x3c/0x200 [ 1003.798728] [] ? ip6_mtu+0x21f/0x340 [ 1003.804072] [] ip6_finish_output+0x2f3/0x750 [ 1003.810109] [] ip6_output+0x1b4/0x520 [ 1003.816501] [] ? ip6_finish_output+0x750/0x750 [ 1003.822725] [] ? nf_iterate+0x220/0x220 [ 1003.830078] [] ? ip6_fragment+0x3210/0x3210 [ 1003.836047] [] ndisc_send_skb+0x98d/0x1110 [ 1003.841918] [] ? ndisc_send_skb+0x779/0x1110 [ 1003.847969] [] ? ndisc_alloc_skb+0x330/0x330 [ 1003.854026] [] ? compat_ipv6_setsockopt+0x1d0/0x1d0 [ 1003.860674] [] ? memcpy+0x46/0x50 [ 1003.865755] [] ? ndisc_fill_addr_option+0x19b/0x1f0 [ 1003.872399] [] ndisc_send_ns+0x4bf/0x6b0 [ 1003.878089] [] ? trace_hardirqs_on+0xd/0x10 [ 1003.884037] [] ? ndisc_netdev_event+0x360/0x360 [ 1003.890343] [] ? ipv6_chk_addr_and_flags+0x3a6/0x530 [ 1003.897084] [] ? ipv6_chk_addr_and_flags+0x69/0x530 [ 1003.903728] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 1003.910679] [] ndisc_solicit+0x2b2/0x440 [ 1003.916368] [] ? ndisc_send_ns+0x6b0/0x6b0 [ 1003.922234] [] ? ndisc_send_ns+0x6b0/0x6b0 [ 1003.928248] [] neigh_probe+0xc8/0x100 [ 1003.934893] [] __neigh_event_send+0x2ab/0xc50 [ 1003.941019] [] ? __local_bh_enable_ip+0x6a/0xe0 [ 1003.947326] [] ? _raw_write_unlock_bh+0x31/0x40 [ 1003.953623] [] neigh_resolve_output+0x5ec/0x7a0 [ 1003.959922] [] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1003.967187] [] ip6_finish_output2+0x9c7/0x1dc0 [ 1003.973417] [] ? ip6_finish_output2+0x1e1/0x1dc0 [ 1003.981721] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1003.988560] [] ? ip6_forward_finish+0x4a0/0x4a0 [ 1003.995117] [] ? check_preemption_disabled+0x3c/0x200 [ 1004.001954] [] ? check_preemption_disabled+0x3c/0x200 [ 1004.008780] [] ? ip6_mtu+0x21f/0x340 [ 1004.014123] [] ip6_finish_output+0x2f3/0x750 [ 1004.020165] [] ip6_output+0x1b4/0x520 [ 1004.025611] [] ? ip6_finish_output+0x750/0x750 [ 1004.031852] [] ? ip6_fragment+0x3210/0x3210 [ 1004.037830] [] ip6_local_out+0x9c/0x180 [ 1004.043550] [] ip6_send_skb+0xa2/0x340 [ 1004.049081] [] ip6_push_pending_frames+0xbb/0xe0 [ 1004.055478] [] icmpv6_push_pending_frames+0x336/0x530 [ 1004.062315] [] icmp6_send+0x1506/0x1b40 [ 1004.068616] [] ? icmpv6_push_pending_frames+0x530/0x530 [ 1004.075621] [] ? print_cfs_rq+0x348/0x1370 [ 1004.081488] [] ? perf_trace_softirq+0x28a/0x3b0 [ 1004.087801] [] ? ipv6_frag_rcv+0x6cc/0x51e0 [ 1004.093758] [] icmpv6_param_prob+0x29/0x40 [ 1004.099833] [] ipv6_frag_rcv+0x3f06/0x51e0 [ 1004.106046] [] ? ipv6_frags_init_net+0x3e0/0x3e0 [ 1004.112430] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1004.119178] [] ip6_input_finish+0x57d/0x14f0 [ 1004.125226] [] ? ip6_rcv_finish+0x670/0x670 [ 1004.131176] [] ip6_input+0xf8/0x1f0 [ 1004.136431] [] ? ipv6_rcv+0x1a20/0x1a20 [ 1004.142036] [] ? ip6_rcv_finish+0x670/0x670 [ 1004.147986] [] ip6_rcv_finish+0x14d/0x670 [ 1004.153772] [] ipv6_rcv+0xfc1/0x1a20 [ 1004.159116] [] ? ipv6_rcv+0xfc/0x1a20 [ 1004.164734] [] ? ip6_input_finish+0x14f0/0x14f0 [ 1004.171077] [] ? consume_skb+0x4a/0x3f0 [ 1004.176952] [] ? ip6_make_skb+0x3f0/0x3f0 [ 1004.182745] [] ? packet_rcv+0xe5/0x1120 [ 1004.188369] [] ? ip6_input_finish+0x14f0/0x14f0 [ 1004.194686] [] __netif_receive_skb_core+0x1300/0x2950 [ 1004.201512] [] ? dev_loopback_xmit+0x430/0x430 [ 1004.207727] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1004.214497] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1004.221237] [] ? check_preemption_disabled+0x3c/0x200 [ 1004.228061] [] __netif_receive_skb+0x58/0x1c0 [ 1004.234189] [] process_backlog+0x200/0x630 [ 1004.241879] [] ? process_backlog+0x19c/0x630 [ 1004.247918] [] ? clockevents_program_event+0x182/0x3f0 [ 1004.254826] [] ? net_rx_action+0x1fb/0xd30 [ 1004.260700] [] net_rx_action+0x367/0xd30 [ 1004.266393] [] ? net_rps_action_and_irq_enable.isra.0+0x170/0x170 [ 1004.274256] [] __do_softirq+0x226/0xa3f [ 1004.279870] [] do_softirq_own_stack+0x1c/0x30 [ 1004.285994] [] do_softirq.part.0+0x54/0x60 [ 1004.292607] [] do_softirq+0x18/0x20 [ 1004.297873] [] netif_rx_ni+0xeb/0x3b0 [ 1004.303307] [] tun_get_user+0xdbf/0x2640 [ 1004.309008] [] ? tun_free_netdev+0xb0/0xb0 [ 1004.314872] [] ? futex_wait+0x47d/0x600 [ 1004.320488] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1004.327221] [] ? __tun_get+0x126/0x230 [ 1004.332740] [] tun_chr_write_iter+0xda/0x190 [ 1004.339041] [] do_iter_readv_writev+0x141/0x1e0 [ 1004.345351] [] ? tun_sendmsg+0x140/0x140 [ 1004.351390] [] ? vfs_iter_read+0x280/0x280 [ 1004.357266] [] ? rw_verify_area+0x103/0x2f0 [ 1004.363222] [] ? tun_sendmsg+0x140/0x140 [ 1004.369001] [] compat_do_readv_writev+0x389/0x6e0 [ 1004.375833] [] ? vfs_writev+0xb0/0xb0 [ 1004.381282] [] ? check_preemption_disabled+0x3c/0x200 [ 1004.388101] [] ? __fget+0x13b/0x370 [ 1004.393355] [] ? __fget+0x162/0x370 [ 1004.398609] [] ? __fget+0x47/0x370 [ 1004.403778] [] compat_writev+0xe1/0x150 [ 1004.409379] [] compat_SyS_writev+0xdb/0x1c0 [ 1004.415328] [] ? compat_SyS_preadv+0x50/0x50 15:00:57 executing program 3: [ 1004.421367] [] ? do_fast_syscall_32+0xd6/0xa90 [ 1004.427588] [] ? compat_SyS_preadv+0x50/0x50 [ 1004.433624] [] do_fast_syscall_32+0x32d/0xa90 [ 1004.439748] [] sysenter_flags_fixed+0xd/0x1a 15:00:57 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:57 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:57 executing program 3: 15:00:59 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:00:59 executing program 3: 15:00:59 executing program 1: 15:00:59 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:00:59 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:59 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:59 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:00:59 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:00:59 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:00:59 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:00 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:00 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:00 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:00 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:00 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:00 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:00 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:01 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(0xffffffffffffffff, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:01 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:01 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:01 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:01 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:02 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(0xffffffffffffffff, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:02 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) 15:01:02 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:01:02 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, 0x0, 0x0) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:02 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) 15:01:02 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) 15:01:02 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(0xffffffffffffffff, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:03 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) 15:01:03 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, 0x0, 0x0) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:03 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) 15:01:03 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) 15:01:03 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) 15:01:03 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r4) r5 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r5) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r5, 0x3a, 0xda}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0)="c41a39b1f175cf8f264e438cccead7d180b8de98faa570705be9f9f794f17d931d1df32384e6989c7f5db2a58188e3c5416e0e098fbc61b32b7a", &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca062f5887") r6 = socket$packet(0x11, 0x3, 0x300) write(r6, &(0x7f00000016c0)="980eceb1aaebbffb52b2d3656bacc879726f0c48b54b82b3919846d84ecc401aa689e4a80b87792484b0692c912c2268962ae4a418a2cb66a9a7b706fa945e9ea28b313309622690becdf66eff2f6fa75170804f54963483aa00f0f6f6dca37a2966cd0bcbce7130f8ec12dbc315d55a1dae72559945a620530df87bf0b1aa2e3f602a79d2b2088bb11f84a2085b7091b7709183a790a10de0b5c3031865df3b0b4912a0b0546b222ddca54d30edcf69d8397706ff889a8e84933a56ea727cd276a03b4b", 0x23f) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, &(0x7f00000001c0), 0xfffffef3) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:04 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x8) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) request_key(&(0x7f0000001440)='dns_resolver\x00', &(0x7f0000000140)={'\x00', 0x3}, &(0x7f00000001c0)='#vmnet1}}\x00', r3) r4 = request_key(&(0x7f0000000400)='.dead\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='wlan1-^vmnet0vboxnet1#user%GPL\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001500)={r4, 0x0, 0xd7}, &(0x7f0000000340)=ANY=[], &(0x7f00000017c0), &(0x7f0000001900)="6f0f14bd07323130e78d0bb09dc05e43b9e95f374b15253a280dae3903466bd9ce15341b3a71f0150309a8cbdf2d4477add0e13bf98914e0dc2cfd6beb53f5105495c556535c7ed13cf1c03fd4c4d06de6819a5106c41143ab48351834fd0f200f87b4b54d16b1a81a525fa39dd7ff13c7054f8b6df1cd8e380e77ad86a68c48ba09922d794450874f0a8fd626dd0ac07f8dcec7988337e1530fda5855a745435bc2496ddfe6a21d4679499df0b69a9a09177ba90c08e26531c697e6ac34579569e197b6fc3f33b47806792f17273468d9abcd8908ca06") bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) shutdown(r2, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x8000000000002f5, 0x2, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) write(r1, 0x0, 0x0) write$eventfd(r1, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) 15:01:04 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000500), 0xa198) 15:01:04 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) 15:01:04 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) 15:01:04 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x0, 0x0, 0x76de17f1d04e1ec9}, 0x20000004) sendmsg$TIPC_NL_NET_SET(r0, 0x0, 0x8000) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, 0x0, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x8c) mknodat(r5, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80008a}, 0xc, &(0x7f00000004c0)={&(0x7f0000000700)=ANY=[@ANYBLOB, @ANYRES64=r6], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r7, 0x10e, 0x3, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r8, 0x10e, 0x3, 0x0, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r9, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r9], 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r10, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r10, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x16) sendmmsg(r10, &(0x7f00000092c0), 0x4ff, 0x0) 15:01:04 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0xff74, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r1 = open(&(0x7f00000008c0)='\x00', 0x7d3beeb4a3686d92, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x91, 0x0, 0x0, 0x5}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x5d6a7370e76da104, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="23042dbd00"/23], 0x2}, 0x1, 0x