ffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) tkill(r6, 0x16) 18:48:55 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x2000) io_setup(0x400008, &(0x7f0000000200)=0x0) r2 = getuid() fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x8, 0x9}, {0xa3, 0x6}], r2}, 0x18, 0x1) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000140)='(\x00', 0xffffffffffffffff}, 0x30) sync_file_range(r0, 0xff, 0x0, 0x100000000005) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) 18:48:55 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x1, 0x49, 0x0, {0x0, 0x10000000000}}, 0xffffffffffffffcc) ftruncate(r0, 0x2007fff) ioctl(r0, 0x4, &(0x7f0000000200)="9f768275074846f894803a95d463d60a0e4e1ad4b494c21c5a7f453603512c847afbb536a46992e5729e551a05f0bdd8606cb32820195bef0a29a7372421fbdba1ecb71445c2e58829b8f1b9e0306d2c2b1f87dd25f135229bbe3a7b7802892665f14529e20ce8af480db557d4bb143d282473dd3e532e7966e51157187ae76c2975b56685443592f392bc886bf955bef5d7dcffa0feffb721c14aae74ba4eed2b06c06764467153a8b5675a9380dc87f9c2324d879323969267a0fa") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) io_setup(0x8, &(0x7f0000000300)=0x0) truncate(&(0x7f0000000340)='./bus\x00', 0x101) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x20000000000000eb, &(0x7f0000000180)=[{0x1e3, 0x200, 0x62cef96d, 0x1}, {0xfffffffffffff000, 0x0, 0x200, 0x4}, {0x2, 0x7, 0x2, 0x7}, {0xf2b, 0x3, 0x4b73, 0x5}, {0x4, 0x200, 0x800, 0x8}, {0x1, 0xd8, 0x6, 0xfffffffffffffffd}]}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x3}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:48:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:55 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2008001) fcntl$setstatus(r0, 0x4, 0x44000) lseek(r0, 0x0, 0x4) io_setup(0x8, &(0x7f0000000280)=0x0) lookup_dcookie(0x100000000, &(0x7f0000000140)=""/161, 0xa1) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) setxattr$security_evm(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0x8, "615960fd4a0a634cbde4c5972103aeded3"}, 0x13, 0x2) 18:48:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:55 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) 18:48:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) 18:48:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:56 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x10000003, &(0x7f00000001c0)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:56 executing program 3: r0 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f00000002c0)="31ed836580a5e7a8fa5e520fa5ca3c599a48190dd2f29ef62d1141e1048a6d9cc84359f1f3d96610f81a5715946f735c3951d30ca060cf3ab6bc62038ffabf8682cc2d4f6e3d63cdf83dc55a81c70dcc9fa7f5e5949a254359c3aa05fab4b7cf3016063318fa0dc2277fb99e0a861d1ef7794bd0e4a43f7be22328253b363377592e1a3e5c42692fd693c9b9384757983ed150ca04638ff8699246b934b8c8b9a2960c5a2b00b54a04c3802eebd83a83daceea09e0b85d4e1e", 0xb9, 0xfffffffffffffffa) keyctl$setperm(0x5, r0, 0x800) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r1, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) pipe2$9p(&(0x7f0000000180), 0x800) 18:48:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:56 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x10) ftruncate(r0, 0x2007fff) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x8, 0x0, 0x1, 0x4, 0xfffffffffffffffe, 0x121}, &(0x7f0000000080)=0x20) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) 18:48:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) 18:48:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:57 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:48:57 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2008001) fsync(r0) fcntl$setstatus(r0, 0x4, 0x44000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:57 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket(0x840000000002, 0x3, 0xff) fstat(0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00 \x00', 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) sendto$inet(r2, &(0x7f00000000c0), 0x30, 0x0, 0x0, 0xc9) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) 18:48:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:58 executing program 3: creat(&(0x7f00000001c0)='./bus\x00', 0x40) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/context\x00', 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:48:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:58 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) write$P9_RSTAT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="570000000000500006000000000001040000000100000000000000000018022000000009000000ffffff7f000000000d0026656d315c28626465765b237d00000400626465760c002373656c667a6e6f6465762a"], 0x57) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:58 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) fcntl$setstatus(r0, 0x4, 0x44002) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:48:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) 18:48:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:48:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:59 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000180)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x0, 0xffffffffffffffff}]) socket$netlink(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:48:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:59 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x1, 0x9, 0x9, 0x101}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)={0x2, 0x7, 0x8, 0x0, 0x0, [{r0, 0x0, 0x1000}, {r0, 0x0, 0x81}, {r0, 0x0, 0x1}, {r0, 0x0, 0x81}, {r0}, {r0}, {r0, 0x0, 0xd0e}, {r0, 0x0, 0x5d}]}) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @loopback, @multicast2}, &(0x7f0000000140)=0xc) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_newaddr={0x50, 0x14, 0xb02, 0x70bd2d, 0x25dfdbfe, {0xa, 0x10, 0x100, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x8}, @IFA_FLAGS={0x8, 0x8, 0xc}, @IFA_ADDRESS={0x14, 0x1, @mcast2}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x40044) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0}]) 18:48:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:48:59 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x2, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x1f, r0, &(0x7f0000000580)="4bdc0a8da618ef27eb01c8b9cdfff84281f52ca144281d9e61b91b0648e814230672b02370e1fd7cfe43cf183dfb0371edba524e714d9b69a3f8ed604076fce3b95e93aec7044da0b7519df2dadcff4c3f12bb6c505f3fe4df01515915ab276f19758d7bd430f5948f0df8cebef4b1dcf89da8918a8039619002cfdea1fa521a2213e9c1541d2f64eda20657670d1f01cadf8613ac2fde976aa4fa11aea1e8746375df5d8fae84b686705bd6498791f675d094c9da74d934cddc7c765de422b60a00002be03b2f6d7be45e3ca18cfa2ca761b00c403524c59438c274eb83fc2678b52351e3ef683316cdee9236187908932276c20adac664cc18154043948dc504164a2ab6069730cba1e25d071a4247d68fb9bbc52428e6cd2c0c261c02dc286133348cd01d13cf88b50eee2d9afb720e9f65aaf1ea3364e011499a93052ba7ec557a6a7d67957098b1c5c0a37cb79f557cbb25a19ffe1d784de408e5dd49cb288c279d560ed2db6c1c5906a668bc0275f5011ee7f33d9d8238d4eeb6cea4011f0809b3b1a2aadb8a9be399bf7a2e952f0a6b3b38afa6c19f55e3522d79d0f84ec07f3825c38d69c0444be6df017b797f34aa2d6f5608aca049e59d0e4cf4749cc2242d0851dcd4dbe0d10f0a7e194f3cfa9ebaf79c8af2410bf6a59bd2acaa306fe2c5bd7c15bcec6feb7bf296b1cce0038aa06c65ff349bc0a4216be02ed406cc75ec6e56be2d24c9152dd2e6757c8023fa4524e987c1b75dd38a94eaee4db1ae3ef8c65da083e8d5bad46945cddb5b2fc3476daae4a22fbc9984696a0f43b227e5cc649aa3d71f1abb04c3a28aaf242ca605c24efe23d502c7b3a06132037b600a613d91c7e91f4006b207de1fcac1542d6bc573ad34958722a2efbb8bc27426197200e46f3ce1525111eaba4092bb71567b004c0b4dd478fc2310bb5de7f3c2b9324086505e133d48bd2e2dc6100a0a2cd09765a86d6b129d6191077094ee0cb07e5e65eb98b99917a392c029ed124554afae42b26cd6abbf73095c983c6226bcf2d82600779448625eb2bad47789b7828ef49b137f60e780991ddb0a1441bf61194ef11c86a4f696eea8fdd6a4a49a955061488b8c09a1407312f59d807c804fda80545703a6169a75168e1696ae61bb7e2deb2234bbaa49a558656b45907e81a736d5defa701d4ecf9de373a26528e9efa72bfe70ef355afe9950678ec66e565c0c597fc9c4b85fcfcde2a90893351bcf86657894162b6623b4e40681fef6e1fd88d94335eaa375503cea2e9961d9d00a5c3349504e2aece41715612ce736dbd4e296bda3ff9a39a09fc75bb364aee75ad23fa3c8abf7462d9b78f9ee9c31a782df6a401489c41944ca4d0ae68af02b97719c036ed08e87ce7236c148f51cf80551581e3c08ba457eed38f1c746ce62f4a27ee79fcc789a90d783b3233809efa8528205d4c4acce609b98548949ebedd16f579dbdcf8994a53a9d727367c9c79ea13d1c666ddbb14af12b45d97b1b3b46770a46980e9cbc3548c3384705902678fa43a70fa4a7263c3c09324b491a1eed0d360a79bb143ebab0cbb7796fdb1558456558233a05632de50ecde7b2c0b37b46931b37279842f3b9bc2f5ab7d12de22c26e8606ad000d06982bf61b0c13d4ea86c7c72f18327dfba4c2ee0c046a635a4000a696b092eb086a1c585588e3b9e23e1b993a6c74dd902d2cbd7136e1024ec9928c208b2a94d0cbb42ba42ca9d6df68c9ed69bab6608ff55107f0da3622b7ce1d8e4c0229f7188b2c87dba4c97f8525da6f2b504dd553a4b20e58aff00a37bf2dcfbdd1536c9be9d93bd2d64da870dfaef70e6620e5f680c2d4396f96a4b365bef5656e72d2665648b84b8bb7876e053aaf3122c4fbba78a67a700370e136c7781dbe071fa6ff01c3bc1ff881f1a140ec308f625414418461e730bab346dde29bcaf705102e7b886705b13052b77a0d0f162c47a787523828e4967019b33cf9d97c14dc10e5981d053debc73505bcd4e5ba40ab4765835d5c850df316974248667ec904052c5c22def9409aa354d60a270fa9ec508c701ee308cf3afea47f7a2aa7e4b06961bbcabdb5e0c2f3e968a642e3eee6fd65d32123c40b024c826463ac2887911fba3f32dee7159ddadbe5fc531260fac06b786e9dfb0b39520798f0f01a68ceea47d1d96fe8493725ad3e21eba88f22343d141b78b30efd5e7b9f14e0f7834ffa6d9ad73f2b733c191dbe739c9bfe4ddb5a05c27ad80a0b0c1cacfff90b2ad57ab3df39952ae75622bb09154174e537b02d2f2a34073cbef30729d19e287b5c586dcdc6cd0675ff97ca4c47be68b3804f63d842af9d825dba3cdb5bd375e3d75c56aa0685c0a65a347123e1636a65e0af6561dba18596fe2ec4b9f755dff4c31f0b2626821116bfe1e76ab2e002201cffa02907aa75e701e037bb3b9c5abff01f3eed6ced6e24da72a31db13d9d1178efa50d8ec0693303a116abd73c5980fee3f3fdff274ec02ee727093c3adb30ca1f1b6ef220dafb8ff1352be692f9c303d5c8d594c6f373eef34435a49a2a86ddac8a64fe86d12f3a497476c0be1c23a9c714f8c8472cefa8c42de469024aa249b07a52ebdf2005a95ed0ebcc01d89e1844f3d5325a467cd37a9132875f145b78bace688137edcad7605a7a26d4ff4638a44c07086616ed8a5763e6d8c89c9e9c424eee90aaf6661c945b3ffb3d23d73662a5ca20fafb2939e5184215fb04a8b8c306cf407105c4173b6b48abff116175979e773587c17e18ffd0059627d54258d7509f880dc2cbd9f6bfd9f67dd707404b6b38901d6ba639c96a34ca41b8a257876167165173ee4e9dbface73d4279325e77c202bcbc2068096deb91918d04c85477514a742541e6b6397f7faaf3ef45e66b3e4deb6165aed4d74f52f64cd6239055d7b89d862e729372be505c7edae03f685522b467a41313b21ab9a49cf3210faa362c8c523f2c2b3891808199ebc203efbd31d2e4bdd08544cd4eee72d35e83cd62732d558fdedb13822291c7e345b08c97c8798124e0849e7c65cf64218a65b8678fcb65043c05e688c7c04bec88f9dd161dcc1e328f2a52cecc873b71a280786845090506254682083b1125ea136ca230646b586be6d234708a10e45911a2b6c8ab4cc470712019a1a3ce93319ab6a5275c9e73b263943307886f316746b423bdd83d9fb9606694b61840358ffeae2177fcd6f7de12bfb191004193231897c053639853aa5f2cb3554171964013d37a9dd35b9ae523de20ec5f71cb00def61f72d8b3c27355d69002dbbda63cf5627dc2b516c260a125a133ebed7df7ca854ce7258be77b4529cf995713359be7250da96d6b5c8126533464dc6bc2540add72d1de1cce64bf15b13b5038b176a91769522966a134831310c82c5d18959fc0258b2e99a8cb7e54fb6f2a71f30de89f6e80bebcbb1dd869ea4f9b1272859d035cb8f54dc1c78150162ed0a52553c6a665aac28b85d880c68909675f6c9e94e1c5237842263fcc414c6b5589671cfd6db9bf2ec22a4ec7e516f27a405d3f83e99535c253049056bec43e34bc3667d9ec7e44a8d356d99e78b8aab11ce8fe52f57d61e8f2ab0f097df86d9011b318caa71f05eb25167c9a3f32597d26c3ef27646302aba62764dbe3a8276a26790b5c4a2eaf90346a0c3cc01b6a5484500dc466c9942438f500fe50c298613e66a05632575fa3d1bc4f74a315612ad417fde05e86482d92ad43475fc2b40fc04b084a661bb0cd4f726d49865504319d1ed5170eef11efbf9513d7f5d16124ab3808d4f815583f963dbbdf207fb513c765241d82d58b1d00ebd749010b7ad124fe44997cb09e9be9fba25cd61d550d437873e78408d8d8181b54b3a448bbab2f32a25f21899dad097716c46acda23ab9aae182a5d5398a93d66644be6deec2b62ce639510fb301e08583cab98d90c5602de8f84254b35dbdd98c202080e3cbd7070c5af535d1dd415e91e14dee827e746ad4bb717fba42af9587acb3d0d61810586e95cc8bcf911f588b091eeb30869b9dbfcf7007f6ed2ffdda72d18623ba9a144eabf5eec66b1c0707c0bff1d2e9f4617f481695bae7f78c0b7c380856d2c1142bd16afc69a3b877d111684c2225dad129fe59e8f4748fb2d843e99920b1e7da043784d1a438b21036397929cd5e9292f29e11df3ad4170182d5aec9c6c859635c491b2c42e66982023a7d75d7d6938909220c5e8eab5a5eaab80e017d8dbeca219b40d6324f795cae77c46c7508c3c4c27274aca82745c4e56bcfd9f8142dc79380e13683e635a1aec03efe08f1454bc9f98619f500c3b816d3d0d85e35eac3e48f5ded174ed3865a42a929f83338759bfe2028be23f3812ad32da9440be591584265309e8c6cfe5d6cb3b64b16754fdc483b025e2295bfbf39dd5d1feccd0367ac3dc4b0da34098c432b8c3740938867442967c7b9062b1075c91d81e49d1d2c26572c70dffe64263abe81857d96a03b80346d980fdb2d53b4c98fa648aee62d741d098938ee9bff985f53fda501e5ae7b0128f5dd3db30e970c119b0bb542e934e561731c90667635fb1ff49ad04743bacf6349d593bcc9620d3175a8219bc37f3dcd1bde2dc7a8310d12331a9c93d1308a62c5e1d49d24945935811030dca9ba97ccec3e6501a415db74fdbf8941d526567c4394d21ceabfdba9df3dff89d546ba24a5eefc6614fcf125e5a1be6eab789836b53f6a2849fe9b54d52765dac4bd77bdd5c7ab1a459590dfd3fdb6c7240e17aebb2252c3430bda927901435b793d57fe143ea8297a78c76e12801aa5fba9f0f1126ea3c029acd40f481e47afe36c89fb351917980c5e644b8c065f61c8ad96116f20757600da1b94a995d5f546081c040eb768563662900a1641e65ea5ad7c13f6a926b90ec11e730e97b950919459c78411d44583be88defb9f6d349b0fca90597a98abe2be3e41e2b5bf0c28bea72907024d64de31ae2f5750894b8a2d583231ab81061b81da3dc41af4a0cb66022e9b78021ad6adce169423a3336acb99d2a1034ff7e752dfa24d4712e59af0529952bd16d4476835b38062b6f8abe19538c0003da72e12fe7ea3946bdff9ec5eca763e8c08a00e6b006da8ec385d496a2fe52b8c8076057f88e401c54a481544ab84e0d401937209d393be5d0d550f475cfed7e6cf0d4b4115a40d440f355997084fe5f50e02d2d6cc327083d39e1395382f28aa427b39f7a8577197b7b43dde249ddc2ed2d2c48066bb1ed5a24d811a6a26a467179013cfaff6d3554dfae3622cee2ab2b30c2a4d55c392102094bafc21809a4ce4bb4cdc0ac388ac995ae23c4b7047debee6913fb3cf8965ea9c5d2c4f28d23fa11997b15477f636b6cfa726d16b2037709e6ad5c7d2c600a31bdc8f080bc93b10a1d2bf691259669c68503d0cef4179c62dd262c43d2d9e66905a539c7ee669e0365499bb6ba20e8a77e9aeb116fdd7d5d83b25319940383d10844f14bc5adbb0acf933ec10ae7595e2e506466e5a2d3096518a7d487d539a60ae818830570dbec17f2be901934832440f23fd3bfb4dfbbbfe7136b7626bff77cd804c37aa1e3f0c9e27bbe3a85b489105d17b0fca42ffe81c09dba60e38cbc5cbdc9956e0af61eead570977fe7a5eef957f2e98decdd1906771d230017950e7fbd4749b91fadc5fd02985740b42039d1eb6214aa83249432f98680122fa6536e1039b6bf5bdef98f225d959958eabf2a8512b0681387613a9a1c7a65e54ec544bcb1d8a91d9463", 0x1000, 0x6, 0x0, 0x3, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x9, 0x80, r0, &(0x7f0000000100)="72537836aaebc5b3811e473e10be4fd98a7c02be06c97f3e357a268f95c8de1039312a2ea9cce65a25e7b1fc81fc3d1d0517cb7b749ae42148365f3c7c46b52ee9ab347d435573b4516f722bc4bc89be413e947f3fd69927c1eba7d24db233265dbc688068ac3b2be4d67ae9554dfd0a881fb25b6969c4ab8f557a4fddd6b5880d10a77618a2ae242e3f880fab7c4fbcf6e36f27e068f9dcb2ce17", 0x9b, 0x0, 0x0, 0x0, r0}]) 18:48:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:48:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) 18:49:00 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0) mkdirat(r0, &(0x7f0000000200)='./bus\x00', 0x1c) dup2(r0, r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x14) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x1, {0x0, 0x6}}, 0x20) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000240)) ftruncate(r1, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:00 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)={0x0, 0x197, 0x5}) 18:49:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r6, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r6, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r7}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r6, r7) 18:49:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:01 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x8) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000180)={0xffffffffffffff13, 0x49, 0x0, {0x40, 0x0, 0xfffffffffffffffe}}, 0x9a) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x16c7, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:01 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x40000) io_setup(0x8, &(0x7f0000000280)=0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000100)=""/108, &(0x7f0000000180)=0x6c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00', 0x0, 0x18}, 0x10) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x2, &(0x7f00000002c0)='@\x00'}, 0x30) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x1, 0x2, 0xfff, 0x100000000, 0x0, 0x1000, 0x10, 0xc, 0x80000001, 0x6, 0x8001, 0x3, 0xffffffffffffff7f, 0x7dc2, 0x800, 0x100, 0x1, 0xdd, 0x5, 0x4, 0x9, 0xa0, 0x9, 0x1, 0xdc43, 0x5, 0x9, 0x100000000, 0x6, 0x8, 0x4, 0x2, 0x2, 0x3f, 0x4, 0x1, 0x0, 0x652, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x20, 0x1, 0x4, 0x2, 0xfffffffffffffeca, 0x5, 0x10001}, r2, 0xe, 0xffffffffffffffff, 0x2) 18:49:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:01 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) write$binfmt_elf32(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x5, 0x3, 0xfffffffffffffffa, 0x85, 0x3, 0x3, 0xffffffffffffffff, 0x135, 0x38, 0x33e, 0x8, 0x5, 0x20, 0x2, 0x80000000, 0x7a7, 0x1}, [{0x3, 0x3, 0x3, 0x7, 0x57c0ba11, 0xa681, 0x1000, 0x9}], "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", [[], []]}, 0x1258) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)="3e22de9e13d6b0690fa1b83fec0ad0bff889e6669054b2258cb4", 0x1a}, {&(0x7f00000002c0)="39e84a182157f85e075eb6fc003226d5bc360ce9fcfd4f58f9356ae92087f32b66cd14696b15cead396ef6f5e38ebc0f95e801badd8938fd7735c6c9ce3e86a4b3c938cfa4b6728807370f9e6d903feb2c65d5d788dab931b36264becbec848fdffd0dea02f6b1baac2ec8ab110c208e89c86eb36f037905ed688f6949d0a8432c561afef022b7f4161534a7378d82c888158133da7147313634b1141d9be5f606fefaaeb6355c8b9a5c436c72f9b45ba7c9d6127e56f1f9f466205091fc43f92788", 0xc2}, {&(0x7f00000001c0)="d8c2cb65da42effbfdec3809da5990cf0d110f32526e89d657eacde06ac67047a48ef2c05af3759f7d759e948a41cf7aff7a7b8d36935d5c50d88ce871a06e8e01346628e5cef1ce85c63c76411605471c1415a66b8c4da63a80942b3abfbc9d3f001cb6bcb2ddad138f58000147954e659880", 0x73}, {&(0x7f0000000480)="e1cb3a2e50fbc2846049f453d8251171a3aa6a6c8a51b1a46e80a5a44471cd9a8b009f3f3f5a11813b7dbbd24531ba21e8c18f73287ec7a8f49fed6f2bb3eefb6ab965d29105ec573eae7b004cfef412c2014f2433c4166595eaf6a7f5d12806d76979af626c6f44e8c6502f8fcce14320de91ecebf8e2e120f4399f6d0278a414c000dbf3ed45fe237012ff2754c8648cff75301dfc6e1066", 0x99}, {&(0x7f0000001800)="4fe3f99f9ca1259e41fcc926270ac49ecb9f02b5681cdfec2745d981120f5cae71f0ae78d47454ca7f0e78bba3f284d26c5857c5df34d6452ba954816a69f04a71c66da404d1177af18656b10428d188a0c039bfdd4cfcbd4ccde9eb03c126db0cd158c056294e06e9f71a406a73ec786f309c243a9a0a273920babb0e46b084a88b4b9d25f2502da5729bc9c5c67803aca227c99bbd2774fc7666fb7e", 0x9d}], 0x5) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000240), &(0x7f00000018c0)=0x40) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x200000000000004e, 0xffffffffffbffff8) fcntl$setown(r8, 0x8, r6) 18:49:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:02 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) clock_gettime(0x7, &(0x7f0000000040)) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:49:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:02 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:02 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x14) ioctl$RTC_PIE_ON(r0, 0x7005) 18:49:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:02 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'raw\x00'}, &(0x7f0000000200)=0x54) 18:49:03 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) fcntl$setown(r8, 0x8, r6) 18:49:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000080)={0x6, 0x3}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x2007fff) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) 18:49:03 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) io_setup(0x1, &(0x7f0000000180)=0x0) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x7fffffff, r1, &(0x7f00000002c0)="e906cde316a5f34c9cca23b520e18f65bc5cf86d27e918ec8fe432ad5da8b95c74166d008903e0b46517a1d62923ee26577efc019951f6d5005016d30302d6f3253f8837476ce848ce331aebce28af7248e58a3afae37ec6d279a756dc77cf6cb4a9fcf5422bbbb04c085ca001bd4f83cce0e7801239e1bbf32fc2963537c99db6945932a74f199b66c5ce5fd39fec9b7438eaba69ed6805a6c4f9818b72970faac028490f7a17ac8e593c6cabb98ca3e788a011e2da8ea9172f7570d53ebb9f36352298bd3aeaca892d7951", 0xcc, 0x6, 0x0, 0x0, r1}, &(0x7f0000000200)) ftruncate(r0, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x44000) r3 = accept$inet(r1, &(0x7f0000000240)={0x2, 0x0, @dev}, &(0x7f00000003c0)=0x10) syncfs(r3) io_setup(0x8, &(0x7f0000000280)=0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x71f6367c) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000400)={0x8c5, 0x380}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @rand_addr=0x2}, {0x2, 0x4e1f, @loopback}, 0x20000000000, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:03 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:03 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:03 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:03 executing program 0: clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) io_setup(0x2, &(0x7f0000000180)=0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9, 0x3, 0x3f, 0x3, 0x0, 0x202, 0x42, 0x5, 0x1589d28f, 0x5, 0x2, 0x81, 0x4ebfc081, 0x1f, 0x100000001, 0x9, 0x6, 0x20, 0x7, 0x5a, 0xc8fb4d6, 0x6, 0x7f9, 0x405e6aa6, 0x6d, 0x100, 0x80000000, 0x3, 0x8, 0x7, 0x8, 0x4, 0x80000001, 0x6, 0xb2f00000000000, 0x5, 0x0, 0x100000000, 0x0, @perf_config_ext={0x5, 0xe81}, 0x4400, 0x0, 0x20, 0xa, 0x2, 0x80000000, 0x9e}, r0, 0x0, 0xffffffffffffff9c, 0x9) r6 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) pipe(&(0x7f0000000640)={0xffffffffffffffff}) io_submit(r1, 0x4, &(0x7f00000006c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x9, r2, &(0x7f0000000240)="cb5b542d715804bb95fd1ce9df0bef97ae9d35fdb65d9fc584ea6e2cf46815f3cfc2ab1689edc2e0167467566a14d732a67ae1dc1ddc35577f6d78667fe003d27e6b81d9b6a3a4882bc73f0de8e67e9a001e5c8976aac9fb007bfdb7059ff4be624ff0fc2b83d9989a081282bf0715183eaad1af07e82929386c64e220a22f1b9d091434f21ce8b96fe5477dcafde021a6bcf1b7e631977786b9b8a56a0794f61ef6413471cf36c0b0261d66b051c0fc3e826e8ab75122c43d93a1f9dd9fa01c", 0xc0, 0x365, 0x0, 0x2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0xf, 0xc75, r3, &(0x7f0000000380)="338d5e88fbd3560112a6578881fbd23b3a52ea62b41419938d77e53c5100f220db5b1b99", 0x24, 0x4, 0x0, 0x3, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xf, 0x13, r5, &(0x7f00000004c0)="15", 0x1, 0x1, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6, 0xef, r6, &(0x7f00000005c0)="e86b0c4c1037429022d1853579aaf52c540257812e2d912767905af56b3edee84df65ad2e6867f06ceef2e4330093e7065abba096076c7cab0215bf6e62a5e4fd11a21d4adc9bd5d10f18e3fff3f0cc0757d7fd0c3329c2651a4e31cfa401019227a84561ebc267dca4a79833078b9ee162ba1a81c9a222db3d7663b06d4cc55", 0x80, 0x0, 0x0, 0x2, r7}]) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x8}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r8 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) write(r8, &(0x7f0000000140)="fc88594db30c8eb62061a8e9b988a7c20d8cec6b79d2352c173dcff72dcad54ff88eb752f2cf9f92ef485a8c139c8d670fd4beae", 0x34) r9 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/keycreate\x00', 0x2, 0x0) fcntl$setlease(r9, 0x400, 0x1) r10 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r10, 0x2007fff) fcntl$setstatus(r10, 0x4, 0x800) fcntl$setstatus(r10, 0x4, 0x44000) io_setup(0x4, &(0x7f0000000200)=0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x18) io_setup(0x0, &(0x7f0000000040)) io_submit(r11, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r10, &(0x7f0000000000), 0x200a00}]) 18:49:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setown(r8, 0x8, r6) 18:49:04 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x2fffe, 0x4) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x8c0}, 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) sendto(r1, &(0x7f0000000180)="5f7c71e6daeac1", 0x7, 0x48085, 0x0, 0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:04 executing program 0: ftruncate(0xffffffffffffffff, 0x2007fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) creat(&(0x7f0000000000)='./file0\x00', 0x100) 18:49:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:04 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0xeaab08d55a0dfe39) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="e59e1b50121aaef6796ff21caca99cf8ba98ecf3666e4e079bff4f0cdbe670e0fa6486d47203234e91d45080fbc53b918b34b2eb3e8e1910d14d16b082905b1ca95acd949abd82ab3b4762ffbc85e94f8ad29280", 0x54, 0xfffffffffffffffd, 0x0, 0x0, 0xffffffffffffff9c}]) recvfrom$inet6(r0, &(0x7f0000000740)=""/18, 0x12, 0x40000000, &(0x7f0000000780)={0xa, 0x4e20, 0x0, @rand_addr="1200bbc23ae5d2d253fc8323e3fd70eb", 0x10001}, 0x1c) io_submit(r1, 0x4, &(0x7f0000000700)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f00000001c0)="9e662050f32a6e48f33601d0e245c2a2a67e8a009a8e0d8bf018b3a9a7cd71eea67c6797024bbe7833f36cce2097ebab6d4d772e73e7be6c1b0f9b8f0d5e03238495c71e1422bf21bda751cf2543d1e9ab8e5e9d85680ae957e553419188c9d8186b1b8c723e00fd4a4dad30c10652911157f4395b2ba5c0f5bdf7fa41a7ad9916b38f641d9902cae5614b84b06f4bff0d403dbd1da0e13bf8e38c9d3910437f9bd7f392a94ada72c17c3b2e8d164faf47134ce6fc1752b93e58cf7514e49e83", 0xc0, 0x2, 0x0, 0x0, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xf, 0x0, r0, &(0x7f00000003c0)="0c28ce3f8d2fcc6e41b0b8f4698422e83204c4c36d76cf15d84497c7b65fe3b328bed5632c742dcda231f1fd585938fca53beda5ee37980bf70230f53939eaf3643e1b56def323069859ecbb5daaeb4f9af5d8599569625b9b1f4a418c67cd2731f866c8f739e441f66ca9dcb399c5921c96f8988b2e13acd719ebe641287005fca1784c7ce279dc7491fdde894361c40cd18ada7ad9ff4d572893a0a101b717e5caf85ca9bd7a1176b9bd36d233e14c02f21e7d2e6b4fe095e3dbdfcd18a6cca2dafb3fc8db289ef8a01187889b15111cea58397bbbda980a591a739966dcf7e5a2e18aa6c766d760bdff08", 0xec, 0x4, 0x0, 0x0, r0}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xe, 0xf2, r0, &(0x7f0000000580)="6c06288d8a317f8a8a1ea65acd7ddb0ba85f7849bb2b30f045cf2022d9e9170be75a461c59c58d43222359302e240fe5080ebe208336c5c47d755242074ee7042e15129de646d3b5e3", 0x49, 0x10001, 0x0, 0x0, r0}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0xf, 0x7, r0, &(0x7f0000000600)="73382cb36c8a2207d3224aada7fb30a8e4cfee8ffc3b065908d292901d39cb4f78eade2ba3d4d698f20df3ba26492b8c4c6e058f143ddf1b15d989ac06c71b3af6b776132006413d4f29f73265081eb1b7c3342a4060634ab2330ef239319a5061b4812da85c9739790528453b1a21c62b7834ec1efd0d3067bc24ce5afea7b529b33efad213157809becca8522de2b9d5433b4e587d0e7d92af379fe7a6176b0c2509721c346881cc8ffa1639", 0xad, 0x0, 0x0, 0x1, r0}]) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)={0x0, 0x20, 0x7, 0x8, 0x3, [{0x8, 0x2, 0xb, 0x0, 0x0, 0x8}, {0xad1, 0x3, 0xb140, 0x0, 0x0, 0x1084}, {0x81, 0x9, 0x8, 0x0, 0x0, 0x4}]}) 18:49:04 executing program 3: mkdir(&(0x7f00000002c0)='./bus\x00', 0x6) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000200)={0x12, 0x44, &(0x7f0000000180)="1746622bef87a55d24e9c7b7929c62404f40578816585a8131c4a605d96c2e6a501e762c52905bec9cf947618e62a0b7dc9f82a9bcf159d97b57e5f7b575e02693a4de58"}) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) io_setup(0x81, &(0x7f0000000240)) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ioctl$KDDISABIO(r1, 0x4b37) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, 0x10, r0, 0x0) 18:49:04 executing program 0: ftruncate(0xffffffffffffffff, 0x2007fff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x5}]) 18:49:04 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x319001, 0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:04 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) ioctl$FICLONE(r0, 0x40049409, r0) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:49:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r7, 0x8, r6) 18:49:05 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x228, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x7f}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x40040) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000180)) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) linkat(r2, &(0x7f00000000c0)='./bus\x00', r2, &(0x7f00000001c0)='./bus\x00', 0x1400) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000003c0)={0x3, &(0x7f0000000380)=[{0x1f, 0x101, 0xb4, 0x4}, {0x81, 0x81, 0x8, 0x5}, {0x2, 0x9, 0x78, 0x7}]}) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r3, 0x0, &(0x7f0000000540)) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:05 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) close(r0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:49:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:05 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x4) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0x8}) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:49:05 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:05 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040), 0x14) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:49:05 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) write$P9_RLERRORu(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="130000000701000600eead05c73b5ff5e0e42c03dbe38e0000"], 0x13) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:05 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) fgetxattr(r0, &(0x7f0000000040)=@random={'trusted.', 'ppp0em0\x00'}, &(0x7f0000000100)=""/196, 0xc4) 18:49:05 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x5) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r1, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x44000) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0)=0x3, 0x4) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:06 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r6, 0x8, r5) 18:49:06 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0xf4a9b}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='schedstat\x00') ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000100)={0xffffffff7ffffffb, 0x8}) prctl$PR_SET_TIMERSLACK(0x1d, 0x6) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x2007fff) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000180)={'nr0\x00', {0x2, 0x4e20, @loopback}}) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000080)={'syzkaller0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}}) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x10000006, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 18:49:06 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:06 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:06 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000040)) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000080)={0x0, 0x5}) 18:49:06 executing program 5: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:06 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:06 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:07 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r6, 0x8, r5) 18:49:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:07 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:07 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0xfffffffffffffffd) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:49:07 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) open(&(0x7f0000000180)='./bus\x00', 0x48a00, 0x110) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:07 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x200, {0x5, 0x71, 0x7, 0xbb, 0x2, 0x8}}) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 18:49:07 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0xfffffffffffffffe}}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) fcntl$getflags(r1, 0x40a) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r6, 0x8, r5) 18:49:07 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x46000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x50002000}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)={0x2b0, r3, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xb08c}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @remote, 0xffffffff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xffffffff00000000, @ipv4={[], [], @multicast2}, 0x8001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xf35}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}]}, @TIPC_NLA_BEARER={0x164, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xffffffffffff8001, @local, 0x1000}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8000, @local, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3287}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x2b}, 0x9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x200, @mcast2, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfd4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x26}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x40000}, 0x801) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:07 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000180)={0x6, 0x4}) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r6, 0x8, r5) 18:49:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:08 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xd4222000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0xc8, r3, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffffc}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x34a4e5c}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$KDADDIO(r0, 0x4b34, 0xe12a800000000000) 18:49:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r6, 0x8, r5) 18:49:08 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) getdents64(r1, &(0x7f0000000180)=""/16, 0x10) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) accept4$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @initdev}, &(0x7f0000000200)=0x10, 0x800) getresuid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) sendmsg$nl_generic(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0x14, 0x2f, 0xafe, 0x70bd25, 0x25dfdbfc, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x404c805) 18:49:08 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r1, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) fchdir(r1) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) fcntl$setstatus(r1, 0x4, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:08 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000180)={0xfb, 0x1, 0x7}) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x0, {0x20}}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @remote}, {0x2, 0x4e22, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000240)='rose0\x00\"\x00', 0x0, 0x6, 0x200}) 18:49:08 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000180)=""/9, &(0x7f00000001c0)=0x9) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000380)={0xfffffffffffffd39, 0x49, 0xffffffffffffffff, {0x20, 0x3}}, 0xfffffffffffffee6) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000002c0)=0x1) lookup_dcookie(0x3, &(0x7f0000000580)=""/228, 0xe4) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)=0xd1) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000240)=@hopopts={0x7f}, 0x8) fcntl$setstatus(r0, 0x4, 0x40000044000) ustat(0x1000, &(0x7f0000000340)) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) sendmmsg(r0, &(0x7f000000bfc0)=[{{&(0x7f00000003c0)=@nfc_llcp={0x27, 0x1, 0x1, 0x3, 0x8, 0x100000000, "e2a6a62ee8ed5fcbd2d12f6d7d1a71c8903cae5a378d7749ec741a57fdd3db9c70ff051779a910624ea3e6137966d25216e8ed7a2fe4515db1c63a64dcd48f", 0x1b}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000080)="22df0b7a45614896a814f343c4d5fe7f0582b3", 0x13}], 0x1, &(0x7f0000000680)=[{0x38, 0x19f, 0x3, "b4ccbbd814d6073c9a932c666e98772c9ad11f450f21adf45d6799b6693954b94974"}, {0x1010, 0x101, 0x0, "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"}, {0xe0, 0x12d, 0x200, "f54eab661c2bfc058776c27815d02660e971b5d2f85034302ab11ec3ef24cdcf1bf81f0ed38416050413ac045f912164eaf72a8aefe90e6b4206cf1f2b71700c0ad0ecc33ac9115d61ac5ca25191bfa39ad54af52b5a93712b3b16dc655f8cceec3a6074406d54d6f8331fb67ba4460d6a85fd7854f0747c5105fef1d4c221fd54006e84248f6862e36be5a44cc23a108774ab7f858636b467b0ad10b42e0530201a5c2d4732566bd26932b831de45647b9537e52263a38ebf9c0923cb08f75ef19291e19478e93b7f4ed0e3150ac226"}, {0xa0, 0x18d, 0x3, "690043e099ab94fd250e80e0cae568677cee897ec764a8f91996a328e46a312367d2063b78dabc5ed4fb036f76902e685b1fd5ffc5a5c093137589e7ae2ddb8f3f68cfa9a6ce448cdec35992e7548cb4bf65d79f651e16da8162f21e50c112e2a6fd1f19c54fe8e7026c23d9c0373a0da7aa43fa3cdcd463b3e01a0c4f2d426828d6e037a7f0da3e5cf231dc98"}, {0xb8, 0x11e, 0x7ff, "98bb379a8e5f78c912f84384a391eadb0a86a7d084b6559f6354105a303f8ac7fc211a4d8d764bd88fb248863c8a4092f8daee0ebc477e5887b4229ca13b43f0ce28f1edf341e1836dbebd9de4ec74841006c471278d0b46e35dafcf48df4164ddcd583bfa0c7ac3a81be99c5a33f8df09c6a1da1f8ee01002c874fc647b785c6f4ae939822b4e1b1478d93a449a07c27bca98bb3b7a77ab69a05a17220623d551ad0ea29a3e"}, {0x80, 0x85, 0x4, "ea9ccf253176e645cb602aaf561bfd2c3cea2500928df0eb0955bb73e60de71bcf35b20fe418ac56709a0ace113a274eb8287afc0b02f556a91768d9d9eb29a392211f54a3519a8bb32ff8250a690e11f4cbbd8dae9332c3cbafe22552d47d529c1bc9bcf24970f49de72c930fd4f1aa"}], 0x1300}, 0x6}, {{&(0x7f00000004c0)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xffffffffffffffff}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @bcast, @bcast, @default, @bcast]}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="a6280bd4af847c5f25e27fa83c12a33f63eb01a4e56128541d93efd45c39439c8d743292b9e3f344a9cefbd1bc0766de78c9a06fc1a9f7223e414db7a4", 0x3d}, {&(0x7f00000029c0)="d95157f8bbab44bb4dfc7a16a64a655a64713bd957cf7dbe5acd6fbdc03b64a70dad2db636845815a51bbf960f5bd680c2ed94640b07267e789589d775b571bf5f552086a3873bca130975676675d911a377beda9b8c709ae6fac1d6c8a55eceeca238721060120d362085d8e272b2ec211afd3d59fb9f368e3c3ab006751ada96073a48", 0x84}, {&(0x7f0000002a80)="7f62f1842a25196568ee292b026cfff848de9d46736eafa9bfab103e42", 0x1d}, {&(0x7f0000002ac0)="66fba3d250d451d029ea7ab2e5167771b250cdba2a9ed76d4d74a26febf7", 0x1e}, {&(0x7f0000002b00)="19a1055aefe88af6510ab988476557365165fccabac1a1abc0bd22484821e7a288faac37a18108247d286f104c23396dd6343279168118090199d66a7d0ee2e9cc105e8dd07d85109a5b9d98821b8979d14ae5358eae00050a3007f981ba73750cb3e67cc2e5930c7d99dce3cefcdac73fb9e6fcb1ba8c04ef393529b87decec1bea143512b27847670c621ea20c3d2af44c243ee24133fca7ee818a69a111ddd6b6d27375e9abd01ffc0add465ca73b6483584767e3f10a0a0b3cb3acee95a5d5e4f6486bac5fa651459c5b816502273b", 0xd1}, {&(0x7f0000002c00)="d0a77176a3cb4dc585ca2c74285eade3c4d6e87cb3ad935ac2ab8baba0b78b44d2dce3581bc897a1a3b0a9626f34776226e30e0c2660fd4734c8c5ad8130f8fabfdc86f824fff6f9e01095b3da1a129babadfc5b444898c224edec833a7eb564699d7184bca21e1632ab9213eed34284314c12787bd351be41bcb1045202", 0x7e}, {&(0x7f0000002c80)="55ba2b38a5304d1dff7baf5c51f2224831ee64f10bd4ed5b", 0x18}, {&(0x7f0000002cc0)="08fb8843b606822080af2c95c6c24184953a8aa303179805cd8fa9f6d2b0a02a2e69a1b9cbe6375198bf041ecae6c88a276f63ca89489c976de3c7d95ae75f6bab467392afda90b97e4db241619f724c57241a67a23e63b3f89e6f48bbd26c0e3a5fbb6bfddc6bbffb71cc40e3bc301530b0c057f3aab815ee61a5e951f665126eea35758922a4d41fec1fa4bbd5b9c2cb", 0x91}, {&(0x7f0000002d80)="b684c904731906f09d43e6389eaae47dd840bea41461a9266b5248279f065a1e1325457422500162f9d8597450208e804b556da76c828ad2df4254e7270dcf89b63ac65bfe6e87358ea45ee3e1a8fee05c9f9a871bebbf48f3c58ecaa5585c12fea24b0b36f12e77b27435cc1459", 0x6e}], 0xa}, 0x100000000}, {{&(0x7f0000002ec0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002f40)="29c4be2bff49f0c078b9ff2f18b9c8b3a1241b209a9ea3fa2605b4996c3a8cf7713650f6d1ac36578739546099d40da5f179", 0x32}, {&(0x7f0000002f80)="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", 0x1000}], 0x2, &(0x7f0000003fc0)=[{0x78, 0x196, 0x4, "7e3cbb0270f52dae4c9305f309ceac38b157eaeeb7228aacc4713688671c031dd098a7d1f6c8722a034b9263668229ed70ef88184bd3a0aadc72698f1f0e132b0f777e6e9e47d39f8e3e32cdd4af936bc23d9f83c3f5121d51c5ef3d49fd2ce548"}, {0x50, 0x95, 0xffffffff00000001, "45dfbbf7dd509bc974ea1cffb4a428bb388aa127c6c5c58dfa36b037f13c4001334de29789b1f159f58735e86736e0540169ce42895e9814dfc6c0994297d998"}], 0xc8}, 0x4}, {{&(0x7f00000040c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x1, 0x3, 0x1, {0xa, 0x4e22, 0xfffffffffffffc00, @dev={0xfe, 0x80, [], 0x12}, 0x4}}}, 0x80, &(0x7f0000006480)=[{&(0x7f0000004140)="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", 0x1000}, {&(0x7f0000005140)="5f20958eee3f2d", 0x7}, {&(0x7f0000005180)="44b8e7200ed45d9a327d81940693690b74c1f8edfdd8ebcbf3fc2f193cd84d818fef521de9ed9b44ea7b0dd2e0c0bcdaefc2d37c83fb18b125ecd747219ffb1c83b5bbeb3895f5af800f8b7ed074cda4f790e880a3dd49e1976d3feb8f22ca96b0b6e19c98c126b38dd9a1b1b57704e7a67d8256f41f598d9c03bc57b9c765778dcf2277063f8060ac885ecea17815d5f3a4457bde90850cb999e0e023375fcb184a7fa2a3cf62c4c551bb39eaadd41b35a1b4b8f971d02a43e3492a492bc40901f27a594b6043db30f0a13e4e86421e8156d678bbf5ea1126f82114adf9bb5185f2f51724f17996c2339790ec4d0943303b0ff465d7227d30dce10047cfadb96bf3c5ba243e4040eb6282d25fa462a20bebbd30c22890d4c078f37bb3ea4bbc076511f8e95c219e76b42a93bf6997f49654fcd4add5e387f349f22cd1a2f7320c6b024167bcde5d6ff63cdb8e0b7889f69e62eb6b4e14264d1fdf77b5ce6c8f4fd7484e413fe0cce2eaf84024f3428ec129915c88f0ee62c23c81878a4671a61e6f7e5dfae4cd66caff36e65bb9aba87a1d2d2468eb2fefb20015eef63f80cb581e000d4d933f7d754c2f1551c845758e03af4f59a23ac88707118a0d9d84554b40195326de10f9e76ca7e7d150a63c596899a61c23b73c6aef117874c78ef5a118b161e2db6f40b8f005c23b4619368b5167a93658f1f2eeebc3022509440b6e22dda647483b5a3ec7aec9057dec9dfb92b29f7b908807510c1d7e0d05a34070b3b2c9dbbf9730ab2ab197f8473935db1e965ec6eacc921d1c6f18deac6edd7093e4e49bfd4128f6ea2254474ed24c9833b02c49c7dc73ec5e356ad1cce1bd42debe70bfc8e846a3cfb4e60a1ed9e05048c446262c0ad4c9110434197274d27e13477a4a2334d9ded00f614846216068f1ec02591296f252a147578656d52f5e350866ba5d9ab0ff3e7fe663c4e3785c419fa4ea9774d7ebb438be381b5ef52b709f47107f55c7a229b8c60212842ad2ce960e727f6cadfda4c460ae36c8340c7be09fe69d8364c4c8bdb2f18a9d819ae79490f168e828da98d129f99a1132800af40a79981cb744aa25adaffa257aac23dbd61817727f3e88f2f7f5c986ed9076ebfeffbf6bb9f8f34a6c044f232497462c6dbfc6d1bd29cc3f5f90b498be28d035bb5040818fc6b5ac5c66e7ef9e1980874abbbd7b7105d8eb6a24f4083d405eeed46b8907c8d56f30950f336feda8000e81984f9ca9bf974a67d055dbe1466140aea347cb8088f3a5c39eb0660b277ae8f4502eab2723d0fde0043f782ecc6b3353be377006e88f7cd663fee0cccdc02074b4ce84e8d0deb535b4cf53334fa48fe0e3cb6356c2e3f55cb17aaa1f1fbdcc2837ffe2170423b0420d73b8a399512c90f33fe636ad338a1f1a5adf425139a0488a168d3564dab7b4f27256f6a09af4e12331e65e7509ad22f13f10a03530594dadb361a3be5535324b334f71bac67601b5281159ebe56fc3479b06e056291d0821b6fbd5a80a6cbf339245c53d48a80e492e0689ae2e8e7ba5aaeb24108f7a6c1342326f7a89b7d266aaf35ec0f627cf92f618b939b3a1f1e8109103d0f2fd6965f49159d4f3ed3d9ab274dfa15bc9e940308048d4702e43ae0a8ab6ffddc007986fd9e89cf80c836f0d8ed69f0c5e83f29156a2124625442fd78c11617c987d1a9bab5d641ef94da245bc22aa8b31e03d9d1428b784c5c0548eb0a47c13eab50ded9f2d68c6180ecf264d28336638174c6cd9c0e81385f8892fd42195865485a3893239d7f48a1076f0893e785a9f5aa625c68c74e4c01a79d6eab2373f3edf789709d112adc7e63e50343c10d5786acd037b04cc771c3745cf5d223f51d4e98121d60efdb0461ef910cf125b37c803a5a41abf9e66bd5e49d114dfacd1d89a773257e0227f588815b7dd6b2f059af4052ff9771a9f3766cc8b249f829bcd3fe6057657412bab97ba6ffe227abbf0fd29d1ad8a4d1e5ff28dbdd70b26cdc888af12eea91413cfbff847c9b2863598104819fea09d4954726b5faba757275719416d035b7afdb149383715cc6f50510406226381cd94b3088111326422b80cca2fda46d3bf02ec95152f70f606bcc18dfdd86e27210d89b6bf353274a21b5b8845f893fc90e5f48a37015da08dc8d913bc13901bc854caee0f56bc56fe98cf54292a0d976b291975e9cd0a3a56c62022aadceecbb4080a7861e86f54f9ddfeb06aaf1a7f287cb92aabfd72f7746be2c8296857834188cf6078d952204cfc7f531933da7f9a551bafd0a0c7b47aa1b3fbcc5d90cce9d0a249c72657129c895347a867d3b8cc4fd282991cfddf66f99d8268f75f613db1eff232c14f544b97c412b324a75694b9de9385d3821453cfdc12b7b69c9cd8a28f7469e36cd94201a2ac537a897929551cba1c5ebe6c9e7ef6ea105a273d0f1cef9959ca3be5bf6dbab6f9987c3874bad24ebaf5f1d3c0eca24dfaaf221a44ed459ba0a0e56fd3c6c45afdd7c00b202d91f8c34e0cd181019f4e1a9c9aa642b5292361c412bf1d2645f4ae6771f439c2a26d34cc7866e230780cf13e53c51c30e96d049971864d417c2d0f4a095691cc17d99fae10a3bb31f44a1c446f0393ad7442597f1f077dc9f085515ba12f78cc9945500217ca7beb572678e0bf4e635b6f9486bb52fef3b9812b93d62ea37ab1b6e199fc6268e814f4204a236b9f2fe9861752f73f3d303be21fa43e055d1183cfe90201d4ab8c149b6ab6cee445bc511728649ab32fe62c6953450e96be1c302aa52b474f9cdfddf5a7dc4cf2a31961bbe94641fe40086bbdddef87b26869bab3aa0858ecb6a1b06ae388a722c957d4ad5f0b910018a088755160e859362e14ad3ee369536ba56cd70c74fc775e54749ffd586ff563f9d81be1bb1ef815a4f3fe625b7691820f6e2a4c1712e83e89edca237f66319b1feefaa8e6371212c709c6ff9c749077430fcf79067d722b631b83d70ed123b3bf16ba3a43b040ffe88738ac44b720add057dcad99e1766a8343baa99c0d5816634a40805186772a787dd0596190f5a8c514db2c0881a1e3ab842a17c909505c45e6c55fcf65a3931ce9133215c5efb4a812030b87fcc147e6e1e348c2552220a70b67b49d914e7e9bd701e8c82c4e2dd1992735b0d6db808fbf7af1cb8359eb2532259d0eaf04bef2ebe4550643206539a5ee25d54fe8ef1958ade56b57ad384d65c21e072ffdb782356733338ea654e77d9b2c07fc8532d9bd8817214f42956c47182a87fd76a1b3712fbc5b16db93e2efc22c3ce25b0732938c582c965c50f0c92523e5934a5df95b3b8519703af187c13cf458095256000da4669f81e4633e076acd51c7889258f51447251ba3a4b45f64d4d6dd5683b411ab9a7157763ed3164c8b150ad6b02d25b0ee7515743a46dc5631bea44b945a61ebd5f3d31643ea4141eb7612d833b0c35ec9c6daad0b8d3a31e1a33e683741902c6db235cc6d7d99985566292b39137f27344bd91f9e0cff32e0955ce0b2d90b6c87a31a2b42e752c5bb0bdf79563245a014ed2eeb42001a5270c0794e33a77903364d468051a01bc59264dbadfa72e941b0e74002394ce9cf79ecec74ba099a5ecccde6be8c8050d0e13b9ebba2630363b45e70eb217362eff47779a18f026f5a75fd5a57e4ffa0cdb2b3ee4bc4c2e53d94b0194cfd015bacaecb085ca232a6bb47171a89db7afc139dddb13f816aad4b88cff3ed8ad01614dec9c825dd06f8f26cb61a7e9c7ccf4020f3cef3fb77b374061102da86adfd63639dfe495f9df8492f55a6b0932940843d68d0b6139d2061874a844a5953b9bb4769e83d3c4f339a6c9be98d6c2147757492e43d51be7a3d7024d2e29dc55a473237dd94ae7dce29c441a4f082e84c7f83660d86582faa64cd1898c3f056c37fcd3dadc325db5c5d6a1d3e8a3129c57921d6640d6a1cbbab19fb3dfa2964a3274c8e252293dc563203050a60aa45b39d6c0a3b6a0f920b8226f91c149026a88681b7171f4b61ddf52e38b85c115398fffda47b38937ae7c560b91ebf9089edc6a2019bdd651d6fcba9ec5d519a62c379b4ddc8bfdfd79adaeed6be6e705815291b9963e4183ff3c56dd811885ad2e8419cdc3f69d94e36b44e8392ae618c3ffb7d034fd6258e030ba09c6d53ca4fd32148f6e85b42bbd97d62a0909737556635dc46bb27b720428600092fe78961bd860c0ff27b9531637bbf873e8d42cb861c4b52e967f2636a14aec89b11b5b311e55c3d0d8ec1d42dbc9ed9b5de365e3f7d3e27b2a1e1ba1a8058a12edcae3198aef5df15e173e839262345ca49176c5ba71c5f3f9b4efb49285d4ec8ab78c3fcf98d75ba5f3513048a7edd25a86ca9779433c9ebed441afe932641245ffbe2eb649261306d519002f1e35c24fa5c2ba608c077f3afe00d7e1d12a63a6f60ac4e802a7daf96504f5e1fb3e9ee969d83323c66a05282c9793666a8d4944befc128f664b95506471ca2a823ddc433fcbcc1ddb8167dce6c49a9abb2a8da76ad0159f1ae6b4e13980bcc98bbbae96a5425fc81ec50538b8de97620957c296b11346803138e863c92646ccb55f3f7bab89f769c50d434cf828d24cf32da06da0a110ca60f1a46e4dea5d77025b0a221beb31675835a866d2cb91e5d124489490877e37de60fdec53f011ba2cadceb882f68ede017de1c5230a783a5c10dd2376b5fe1d039009d905ac839b94c30316570d20a2f306b0a69dc033cc8cc22cda791b929fafb4050431cef7fccabbe0414b6bf61b8a140245648adee6d0f21e7552421a5c7de24845ecc9bb8971950a163d303d39b0f509f4273a7826125bd4a99dc51219f47a10b6115d4fc5c60c4e824719847aaad7cd9a0682512d1e1db39d58794bcbe81344f1149530e0964d1686b009bc7fcf34a49b33108d77585190b83cd179fb15eb510326327c365f653eb9ac3275d839d77729f7c8629d9a3677c528ca0e01278903e0e1eb8427253c5896866490c89a95ef06c73e2b0770d93036d7091d55f6c6cb6c829053781fea2dcc19e6eacbfc3a23795e681881cacfac475e9eceff9ef0959b1839323432dff9b1403f27c2d23236890f3c4dde781e741e71982b7676c3ef9cb3d0ac0daa181000406d0376722ade131fe376fd86dd99ab2464e6d5797b721983f81d312b2da6bfec17fc9c1271dc0d35915c316e6e1fb1927d0fd6111cab0d5567732003f4a66b64253e55468328e4f7c1367229d8424e4075cfcda0bdeea2a316a17f52d05d696012d9d7c3574e42f1fc87121b09e40c8174f1cf27aa2e09a028f288b5f74b0a907ff530551b038d9ac998e6c3a8b9edb5bec1ec23df37dbabc1e2f4db6679b780e4d7e9929f65fab57c763f51b2d3b3669c03bbbf5f87289773f7b6c32f7fd58926d12c2b0bff744b1a026ccfe280deef60672c04e4adfc9fa524cde10a3b47c145f893fcd24d9dc3fa763551d34d9a5260f988c4769074735ca3503982409ff9a30f73ac2f2ac25855c68d21f2bca097bea4d1d770173203319da3ab55961ca1a332e8536b4095240c227941f8411d65ea34f03c2c5ae1a9c93cf104618476beb32ff2dcc1b338dd89240fe220df2f7706b4ee194b875ab3ffce012e1a199daa369149e1a303532d820d72617145afbb8a6f57ba1bad2b0cad8608a71510214cceaeb2c4219e5544184f14d48a90d8cfa289e9aa75d124dada8f5ef3023b00f73a396cc3f1693e5dfceef1028f03d230dca0cffcd7808a8fe66d1c8c683993cd2", 0x1000}, {&(0x7f0000006180)="053eaba3914fb500853d7aca6f321e7178c0f25a6c75051c1fe9c2d115538a0f37c1e95b50242bf0468cf5411df572", 0x2f}, {&(0x7f00000061c0)="32f894821ab71aa69c40ef32", 0xc}, {&(0x7f0000006200)="38d57b2ae64243969c917a91709064a679bbd52bbcdd6675fcec697828a911c0ae9759a2bb35863479ce4bb6092c1e8f90668de663055594ba9915c8dad073262b55a1df797b51f888ff61eea3996b6cc6e77198986de17f2311f9c7a7d3718e76e973e2aed54eec7c54df2811c1ac553cc874b4ab32890083131c7a81681c99618d2cc68eee476b6c6a2ae5c94bfcf6f2ef3bcb73853097af604fdfe07d06cd35ad8f6115cb93735407b76c6f7da1ab2940c550f6c41d15ff863e50aa474274b1a727706f878167074bb08cef2336d1e6d9ae33b9da157535e781c9c3377021b09a9ef3fbe140a8bdc4", 0xea}, {&(0x7f0000006300)="16c702b57ba57a7f71e257e105048e9b8e9bf82eb78ac0f87735e556dd06002bed8e3a5dc14dbaa653743a94f424e7a43240239e", 0x34}, {&(0x7f0000006340)="5188db8e83eae26feae8f85c9f7891abef9a452ae9f6e3aa3f49fa42696ca53549b9238a6e60bf25616617dc2e728b6b157d147501889a92e6de5c5e18ec6ccd006b8c0d4a2c8de315c54a7202971c8dbce98aa74e466f125797f7605f8e0937dc40510e125972bfca852ae1477c2ac0969e355fb3", 0x75}, {&(0x7f00000063c0)="e4f718182980c7ce0c71a73e89a6d0bb2ec111bf42e1ec8c4227ac350c2fab21810d98d2e05c18e5271ddc326ffa3fe54626e8fd476272ffd1f9f8d36a1c189a771b6550b73a1a33240623be82c1e1aa685ddfcd34fe4747e8ea1263", 0x5c}, {&(0x7f0000006440)="c1540055dd969a5a73698f9ad2940413cf9b9b5c1301d7b6f091c03db87e93b037bd5af3cde601529d70a6d8b2b55e64560615aa0016f8", 0x37}], 0xa, &(0x7f0000006540)=[{0xc8, 0x1ff, 0xfe, "d6dfe0d2202a14d91c411806756200274f01d4ca26ae4ff2bea45150b2a99c71ae5913b0077b190a224a85d519ee1828aa67e189f9b3a4b58d2785f9095b39d8c3431e047699fc783f752787c6ec746d3c31d50ca828224d8f3dab5537e95ca43be796bd5e14c6faf65063dfff9a18603beef1ca4f826e788e9f5088a8b6c49a6190142889ec57bde22d63d49b5410c417b11d5f468c75c04d63bf498a742800ee1865643e9401e1e67311583ff3068eb9559ed21fd2"}, {0x28, 0x0, 0xe8, "7b5e676b1039a73ef6ab7f1e5bea513887a4"}, {0xb0, 0x1ff, 0x40, "5af32cd9a695340c77851c0e993728278e76375b9ab5eb26c3bb1665896f13344dc1fdd534eb744828b837c2d824b9af67b73a47be0022f89e85e62ba82caf7be04ddfaf11ff6442c42294a7a52b62bd3d626e2393866369b085f66473dc238f9e858324729b072972086d07fa5a433cc13ab890f46c22be2760bb436c674d84b3a71adac8c25472214f5d9845f8a6acd853ae7ccc6b6718ccc8fb3cf7dc66"}, {0x10, 0x119}, {0xa0, 0x12d, 0x7f, "ed0569c030b8b84b4045784507c6b535be9e2377183c94f1e6d9fe8b3bd807c1120060932879f08dcf83392e6df66750a285bfb16a961731bab5d7c88bdb3741126e14b9149598b99ce3ffda586f2d29192070e793611dc996babf44e313c1c959129b449ed07ae291856d446b59e2fcd411d51e6f33c1306735a39e94708f5eded7c38bccc7ebf4544bc3"}], 0x250}, 0x752f}, {{0x0, 0x0, &(0x7f0000007980)=[{&(0x7f00000067c0)="d5d31bc6b0649cd5e99dd44a060a8169d3e763841bbe68ded8584a47b974121d8abe3ec91f3b52dd0953db8d320e33607eda412df2f49471c0fb2be2f2bc5a0c2805f7cc84653402cb340064135e03c9f75d28c86ae494127fad51f4ef9b92f3abc3d31cae599e07c4a2efae", 0x6c}, {&(0x7f0000006840)="3e247c6255aed812c81fda756858db05db7ef1ce7cf0225970a635e0d62d028fe8363cde8bd5f068fd00f12ae3abe7681c6fd4c1d724ba02b13299e83a56eed414e818ab64e0ecfb59c48c73ffa00a5907ffa34965cd982d173185d4252862feaf09cc1883d6194f82aeb16e6370713d09", 0x71}, {&(0x7f00000068c0)="be2fb9400f506f3d897f6d696f5ee122bdf05be097657c5ee5a01ca80b325cd18666679a69c8e1214392ddf7bd6001acc25ce570145a05ac6d812e310fdf0a43fe3a07e42c99efbed4b6cda95fde889473b493837b964015b3b2ecbe9a18b922ff2d15ed33f7a626d30fa1373a5907b409cce9a8f92560dca68f761c402b6680bc4e", 0x82}, {&(0x7f0000006980)="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", 0x1000}], 0x4, &(0x7f00000079c0)=[{0x88, 0x10e, 0x2, "48456c73932f00f3823e731bac9bd210221b02205516b1e0cae29cd138830ae2477342eee89bca717832dd03599deff514a5d21167c887d2d50f423a35e0cc7832fc2e507d722c03765636e5a8a224eca61d5c3ba4d88d3b49ff2b2952ac24eb76964ea2350d1a16073180f36e8799029df73e82"}, {0x10, 0x129, 0x3ff}], 0x98}, 0x8001}, {{&(0x7f0000007a80)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000007f00)=[{&(0x7f0000007b00)="baa1df349dbfd3f25d513f0c14c9ece25f600e25a8b8d61b30e27e0a34b74dc3a8e4b9270fef06abf1caf23725cfaa2bc07c8e6b7e966d028214cadb208a4a51d3905a8341de9b9a459c2d4f7ce79c110db5d2ccb0eba17d833b57ef44abfd4c31cbe7621d3283d29cf8152f52bca0dd3c22ef634af9ce43adbdef47781bfc306718a5d30b536da3ce0cc92396bdeb9662aaabf55be8beb8340c599f8613d5a2c0529c99e92a130b29db097507ce9e51400ab3b11eeb4a5ae6e885714cb44d47161d05a5293e7d79a3bc6ac906e15d130a0e01830c11df2ef9c65f09bcee48", 0xdf}, {&(0x7f0000007c00)="ce7bea6e18cc40a0517005cdd0e8b4233608504e4460fe93843690e1af07799e499ebfa8170cd6d67c0a86b5b7e2ef70158e2466e7fab69009aaa1c431b3fb6f1ba4a38b94d6e0c76adf3bb6a3b01850b785fa470453786afad748dd4340146faf2915f8a97488092fdebcedd06bd7c7cfd7c5e0e69af4eac3d6d8c1f14d3a2f392825ce2e5edf355cf89e69be0a8b199eabbfe68d6c84fee4b3bf3595acbaac0e69fbe6c84e349486dda079b979d0c5083d43d0cfc443367fc43e82c7561a86c4", 0xc1}, {&(0x7f0000007d00)}, {&(0x7f0000007d40)="680703001abd2f41586519571b6b9ff8760d438514d37a7184acef", 0x1b}, {&(0x7f0000007d80)="ca6e85762702c1fd92b38ab134a51cc0bcedbe68059c170378162a631734ecdbc1cacaffe2149e36bcc0d5a96a465be74ba943faef5ffae276bac68bff90222353a239c964030813ab35c91cbbcac21f6d42bb7f1f2f735bd43f2b15ed1b5fb0e725e0e2b6", 0x65}, {&(0x7f0000007e00)}, {&(0x7f0000007e40)="a428beba92c657d436f2783e539aef9a39f7acce970929f5da592ebcb8eca4e81a5aae174f0c468635e7ec55cd8a0db7fb6c9798d243ec33f6d7a0c5a350ae4855e1e1fbe95e405e3f91afec2c67ef4440ae9bc5927f3677350a826a60552948188dff68e94a62fe6fa667ebcb8c0a2b48491cde6a15607185fcabda94d50cec53745ee89f291f72584baffd67eefb29bb824bdaed08980da65f0026f1", 0x9d}], 0x7, &(0x7f0000007f80)=[{0x58, 0x129, 0x1, "fff165ab595dbc8813c08fc8b6e1fec287ad6523c11fbefff3a510ce236985f6ea41f70e5c6f939459671026b2b801bdfe4c23816e77aaeada7d0a3c27aa15195050"}, {0xd8, 0x0, 0x6, "2aac8586008c8765e240ae21fefa8ea9ad85e99fa5170b2289d0188f97d686d366a8443bbf492608be26a38945f02f969dae2c6a3adec3318bed86d902c52326e2c391bc9ca338bcfb23451fd37e9288d4f5de989bd2789fc0c9ecf86d75d2c925ab3d7b48529d44b7a6c93bf69f180aea314e7de7c6aa75c5d8712d86a9dc715492dd2b943857a354d9020d2902785fff24485ebd9d28ce04451578428c467f5e7c6af7b56d07f2079ad47a69d94672067cc0659595d3abbdabcae3ddb157baa60d"}, {0xe8, 0x13f, 0x0, "04c5487a20808adec8ece73367e0a6d7c079d62769a0b31982507376c6ae00f95f8634f63e169178bda72d5db1ed50a5ec8fb24facd616e304b47a701462ba05298092b1219e03049d8f4658e30edabc5874ad67fe3edbd3cbf7323a5eeb7e212f176097a336a2c0e1ce4a2534ab6944d1cf66122f734e89f9fba7a9519c213366e162e2c02ff77777e81110617f8365b869b7acad25d79a7b3c65f2abb2003c299e5c9db6b99bed8cdff19d760a8da94200c48a7c3aa0b34f5ddf332045d5b523f88a79c98161c3645b4f4599a5fc456593f6fbe92361"}, {0x20, 0x0, 0x8b58, "1ae4e1d4f73748497040fc587de9"}, {0x60, 0x18d, 0xfffffffffffffff8, "c6fcbab816b4a358358983ed73fcb37ef86d38764a4426fa155feab43f5c925080d0f632d221d76708a115ac0bf6c1a19c08916c2c94f66507a1151e8f2446ba73622c4a5ca292abc87b8e"}, {0xc0, 0x113, 0x80000001, "4c69285eaf0558d6b4eb8b7cde335ee87fd2e22867c5cfb8528f48e2cf6254a283c5415045f4100e287380f9797c2b80c37853346aeda399d9e45d1367e8e34cb75d5ab896330f5b0d2d133d525651c530f9234c55f4898238d4a3d1e2975dffe0a3acb2837ae367392446f02c2fc45afed23e3de3b935e668fb98e78946166cb91ebe87a06f19183885195b728e97bb9c01aea00452956c47f510321b19566d81268c9d00833f0f58"}, {0xe8, 0x117, 0x3, "6503be732837504c954148dbb0d9dd5cf08026b5f7576d5cbfa802c323e3632fcab89e1e96002f739dc9d7456ffaa9af81865f9ae80e0f0e2d92298c38b35fc0e97202f8112d093a86c90b8e258aa642f4b3c450ff270e165a8312ff871456109216e6fead756561a448d311020222559e2d74cfb2b1167dd90e78e61a416d6faef7e261b31502334926524263c82dcea47f505e9e0365f0c58886e75154eca1107942ea1866a1c1a551942c99fbf15687b4df08a468eb046986ceffbfc272f6d8b7254cab0bf3ad025ca213e4f7cde6e734565719"}, {0x1010, 0x114, 0x4, "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"}, {0x50, 0x10c, 0x9e8, "5cadd3b7de017ce671b3bfc39e2638ead086809f27d090fa4f236a41cca9375325f74e23092238053c362a03c56585defd3cedd8d5123bf857f1b1"}, {0x1010, 0x0, 0x2, "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"}], 0x24b0}, 0x80}, {{&(0x7f000000a440)=@ipx={0x4, 0x2, 0x8, "f6ace4d90cc4", 0x7}, 0x80, &(0x7f000000b740)=[{&(0x7f000000a4c0)="fb2a886eb335f1907ddae65e25", 0xd}, {&(0x7f000000a500)="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", 0x1000}, {&(0x7f000000b500)="f7fa75a8bd90fbbaaed1e77e20f55d206e69b306fe30e739c2f4828fdc6cc331d5e33d0e06a1e76af393ae6045ce11067e9f1b2ac0d90175e3a13c6ae5ae6ebcaa218748aaa6ec121011bd32b7b07164a1886dd1fe0f927290e7a9bd386442e5914d23a24dfc4670387d2fa5c7aabf33d2f5c36fa3b7f91f3d04c64672a7d60250861e2145e42b3be744876c4e14bf28", 0x90}, {&(0x7f000000b5c0)="daa60dc833bbacc7a66d3d807b63e196c8e513952f4506794f19c5ff9249436eabe4f42010cb9f92e3c8f4bc1cbd2b5d20c616f077df2604820f17a7779c87d57d0b310812a8fe529e1e2a0e053d3871a08de46f7ee40bce2cd5fc0c88b1fbc608b96b6b52e3dd3ec2ece13e841ab1859a1e7c6b1aa8852c1dd7c1a13bf11c3958829759af3e0a4758785c828ad2f815", 0x90}, {&(0x7f000000b680)="5bc77cddfa5a088e036266b4d9795630bc8f409baf9bfc5d13df59e0105f045a1b86ec663cf433a32a3f97ed8aefea6adb9bbb894dd722d4effab0418cfff563c2d26768fce73221b0459ce152ae495567aeac75da8e7839598bb9fa0276eeb1dde1a931c89916532171054c657b5c22978436d64b093d8639e2c8c6438a8708cb9c94869ce823f48bdf896a6f3c95e387752a66", 0x94}], 0x5, &(0x7f000000b7c0)=[{0xf8, 0x101, 0x200, "74de5bea4eca3d5ccd86816568e5c625ccb7eb5afb8d46925ac6ef73c19637cec880baae13f29a7a4c1ae19ff5a6cb66aeb8101fc3bf7c3c19486051605d4e388fd47b0c6feb6c63c83213a166d84069ad7509065b36203193fc92bc4f7334f1b1fd0dceaf61da903e5f7d0de261f76c3f58617a3081a65f53778d32f38108c32bece6924dc634f163cfabd87a743461be4f4ec561df3421390d96487fe625896ca3086dcc7ff45d6464478b2fdc9c84c7e9f7d854f6528629d9f0584f30c05a425bd6205c8a40d82ad424c250ef26c182e69bad488410cb938d950f214934a796f409"}, {0x58, 0x112, 0x2, "991a7a5c833d43d54d66da1d2dac0dbc38db53bff2590cd4dfb0c3caa45c769176c8feb0e83b25ce9225cc8ee3eca7c6499421ae695324396fbab6cd7aeba196808a"}, {0xf8, 0x113, 0x1, "c6b28ad6116d27072ae5c252c58087f44545816d1ad721b743002b07298f2553d9b7574f1f90b2f7191d02aebdb9687a9eed5886dcf0039b2bf9bd6617c8afff0af251dfdc770d8436763c09575a1a80479e5ed3eba06aafd2738b4a4ea3e86aca54e58fdce7eb6d2586021b263d736518e0d9956393b4fb80c94f0ac75579beca208ba41962c14300675758b83b025346890cc000f6f2f7d27d706a9ab93b34291d6c751327bfdbcf5172c3a8b81e7d807afce4ef31e3cb2bd7a9a99b1bf7368da55bece2c4802576f6feac77ff805b5612a0890035cde8840d393c7dc4a6d36442"}], 0x248}, 0x5}, {{&(0x7f000000ba40)=@pptp={0x18, 0x2, {0x1, @multicast1}}, 0x80, &(0x7f000000bc00)=[{&(0x7f000000bac0)="85b55d61c0a89c7e93bd75299e4c265e7918784b1d7873f768cb1f77aa390000777a5df8badd71ebcc6d46c424b764e2f9330c060e3d87d5b0118bbcbf7d7c1bd77b0cf3a664950883a9dc3c3425264f5dabb1af1e9438", 0x57}, {&(0x7f000000bb40)="4ef4b0bdb88d94882d48f6f27923a0ba6be1a4ec9763bf1b761ebddfef1281b78ad1a2954f3d51f0f1c85ca734ae22d02fb48c14ca4660a083aae2a4df4826d287a12c18f7e371c33b74820db7ac30c83546c892d0eceddc844599b262cd6a6413af9e51ce346375843caf8693fdb54e66fc669f865192395198abcb060dff6383656942e0b3cbbc597a6c4984d550efd8ab87d2fbcc5c0bee440f4e126752e969235469142d8f7d5f1c", 0xaa}], 0x2, &(0x7f000000bc40)=[{0xa0, 0x109, 0x10001, "b81710ab8307b52aff0e4319a9aa9bbdedc6b1f895a1a376885853fdf9f35a844e3da97ea7154743febd8d23684d1d1e029f2cdbcc6bc158d8d451e02be66ffbb57cae5d310ff3253f5dc6fe18a2df85d49e428c9194961471017f86cf26b59cb2120a48b8f9ab9400b06212076f84775f7749c5097e38d5904128f2b5e0ef49090fcb0a64ee179d6e1c0c13f1bb"}, {0x10, 0x84, 0x1f}, {0xc0, 0x13f, 0x6, "0fd3a59c7d71569caff8d0e30105b6d42f68952d2eb520d09a0b3fcaacd1711a6747d5fb0219068eba1be7b5925c87be2ea4f10d5b42750fbcc0d2c501bfd8a43562b748d3f1be53de6cb57ae8cba387128690ca7d3cec6a4cb08e84db3748ddf1d285330db99316b98fc1ba479effebb7a56a2ffb6d2ac134e4c45d6f9421fecd9af9ddfe2ec142095c76e6fc6cbc1ba8411137cc4afef25a2553c4aea7b3285cc1b56a37b09ccc5d75244adcc5cd68"}, {0xe0, 0x118, 0x8, "f116b683fa60b68c1b3a7f8747a013946cf07b348567f1582468c7f400a3917e6eb5d19ab98fc39150bfa50d8c5bfb3cb0746012e797f4daa24133624e66fbabea11a1fced53471a8d37ac9989f71f3df1a42aaf05cb3291b3c03cff3d8dcdba6dd8bff682bd40a5d1fde46a80a51198f7b27378cfa1a0cff45ba04263ba8a389cbfc7feb82f0f605abce8f1cc06b0833ece897232880eeafef48834c0ce4298771e17475230b637b0d85efee0b171a7fb3722819086afda58720c85a0f3e4ae645bc7c84702835121e74ae3c62a833b"}, {0x70, 0x117, 0xff, "39af8718ab894d4e55253ffcab26645bc75e0e1a58d2ee0e170cb2abdf3d1a823f54e46e21a85291efcc7691f75397f84fa81e81eaab572770e80fdf193473e1cbef503eeb97917bc866afe548d014121fa630ab49813c5b1168"}, {0x88, 0x6, 0x9, "ea0da570050dd752a0a05ad541d43a9aee77a2369301c448991406d24f25aa32483a5d235a99cbe3f3c5c8ac84b5ed450432e13e2f584e82cdc4b2c459c9af2164011661906c0fbcdc074c5b8c608607a1e57a6ff6de0c885366b158e3c2006234ca339a39e297e28f9a72f98a5c7d3a695b1f1dfe275f"}], 0x348}, 0x2}], 0x8, 0x40) ustat(0x8da, &(0x7f0000000200)) 18:49:08 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0xb0e) 18:49:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:09 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(0xffffffffffffffff, 0x8, r6) 18:49:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:09 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) 18:49:09 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r1, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000300)="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") 18:49:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000200)=""/10, 0xa}, {&(0x7f0000000240)=""/9, 0x9}, {&(0x7f0000000580)=""/222, 0xde}, {&(0x7f0000000380)=""/173, 0xad}], 0x5, &(0x7f0000000680)=""/165, 0xa5}}, {{&(0x7f0000000740)=@can, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000007c0)=""/194, 0xc2}, {&(0x7f00000008c0)=""/141, 0x8d}, {&(0x7f0000000980)=""/89, 0x59}, {&(0x7f0000000500)=""/37, 0x25}, {&(0x7f0000000a00)=""/8, 0x8}, {&(0x7f0000000a40)=""/98, 0x62}], 0x6, &(0x7f0000000b40)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001b40)=""/29, 0x1d}], 0x1, &(0x7f0000001bc0)=""/4, 0x4}, 0x3}], 0x3, 0x40000000, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000001cc0)={@empty, @empty, @local}, &(0x7f0000001d00)=0xc) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r1, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x44000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d40)={{{@in=@multicast2, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000001e40)=0xe8) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setown(r8, 0x8, r6) 18:49:09 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x15a, 0x49, 0x1}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:09 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1d) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:09 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe2(&(0x7f0000000480), 0x80800) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x1000000, r0}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) execve(&(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='#}\x00', &(0x7f0000000240)='systemmd5sum#-%#*&\x00'], &(0x7f0000000400)=[&(0x7f00000004c0)='\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='\x00', &(0x7f0000000580)='#}\x00']) 18:49:09 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f00000004c0)='./bus\x00', 0x6, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000400)=""/13) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x104, r3, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x403}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 18:49:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(0xffffffffffffffff, 0x8, r6) 18:49:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:10 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='bpq0\x00', 0x0, 0x6, 0xd37}) 18:49:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setown(r8, 0x8, r6) 18:49:10 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r1, 0x20000000000008) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:10 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x2, 0xb, 0x0, 0x7, 0x7, 0x0, 0x70bd2a, 0x25dfdbff, [@sadb_key={0x4, 0x9, 0xa0, 0x0, "2ad29ee3580fbff66809ab4b1545b11b10570c9a"}, @sadb_x_nat_t_type={0x1}]}, 0x38}}, 0x40080) 18:49:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:10 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:10 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) readlinkat(r0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)=""/102, 0x66) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) recvfrom$inet(r0, &(0x7f00000002c0)=""/126, 0x7e, 0x40000000, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(0xffffffffffffffff, 0x8, r6) 18:49:11 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fsync(r0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setown(r8, 0x8, r6) 18:49:11 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x40000) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x374, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f00000002c0)="9a674dc539cd35211a012e98776643393b5b712a0b19daa4d3f8845c96a406c670531bf17eb8aa2cb35c836da7cb31a1406dc0d5b1c7", 0x36}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:11 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:11 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000002}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x220, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x800) fcntl$setstatus(r1, 0x4, 0x44001) io_setup(0x1ff, &(0x7f00000004c0)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000500)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000700)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, r4}, 0xc) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$int_in(r0, 0x5452, &(0x7f00000002c0)=0x3) recvfrom$unix(r0, &(0x7f0000000180)=""/228, 0xe4, 0x40002002, 0x0, 0x0) 18:49:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:11 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000180)) 18:49:12 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r6, 0x8, 0x0) 18:49:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(0xffffffffffffffff, 0x8, r6) 18:49:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:12 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x6, &(0x7f0000000180)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:12 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) r2 = epoll_create1(0x0) epoll_create1(0x0) close(r2) r3 = socket(0x11, 0x803, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f00000003c0)={0xc}) ftruncate(r0, 0x2007fff) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) recvmmsg(r3, &(0x7f0000000500)=[{{&(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000580)=""/241, 0xf1}, {&(0x7f0000000480)=""/67, 0x43}, {&(0x7f0000000680)=""/4096, 0x1000}], 0x3}, 0x80}], 0x1, 0x40000000, &(0x7f0000001680)) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={r4, r5, r6}, 0xc) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r7, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:12 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000180)) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:12 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, r2, 0x300, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40001}, 0x800) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r6, 0x8, 0x0) 18:49:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:13 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f00000001c0)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000180)={0x6, 0x6, 0x7fff}) 18:49:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:13 executing program 3: r0 = creat(&(0x7f0000001c40)='./bus\x00', 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) r1 = open(&(0x7f0000001d40)='./bus\x00', 0x141042, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000280)=0xffff) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r2, 0x2000000000000186, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000240)=0x7) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000001b40)='TIPC\x00') getpeername$netlink(r1, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000001c00)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001b80)={0x1c, r3, 0x305, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) io_setup(0x4, &(0x7f00000002c0)=0x0) io_submit(r4, 0x9, &(0x7f0000001a80)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x0, r0, &(0x7f0000000300)="628e243f322a866b2acd35687ef3a67059f147f60ed6c66104b2235f661a671a7392f611ebd702fcd6674f07d6fc9ad5c849b0390c544ab0a7819abf606fd8a63122dc721dee20aa", 0x48, 0x0, 0x0, 0x3, r0}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x5, r1, &(0x7f00000003c0)="77ac98a661eb6b933ecda21901663d99605c904307b1aca2a21b7a9dfa41ee572e15b748c2515b54ef66555f1b00e3999fe6b84dc9e2f7bb9322e5951adc11ff4f19aa2dcd8f99081959dd30aee4e039889a86", 0x53, 0x4, 0x0, 0x0, r0}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x6, 0x5, r0, &(0x7f00000004c0)="d527fcb338b38ef80eb209569c0dc09d19dfd075f03ae5aef9b3666fedd9b4ed76e38a35f49310eb31319aa7e025e81dc23ef59063df4ff6cf1935af381e66bda6f84b1149baaa5d60a50a4f0b2a15ce639b", 0x52, 0x0, 0x0, 0x0, r1}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x6, r1, &(0x7f00000005c0)="f53a4d6a22e93a", 0x7, 0x0, 0x0, 0x1, r1}, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x1, 0x1, r1, &(0x7f0000000640)="d286b7984bf4846b63fb37e6589cf054baad70e3888b27863f01ff8c1e63e738b87c81715bc3f8ecc9bb7e73191e0118198b0fb3eff64fa8a81f5f11d0aeb68f772b2d09ddaf37f9339dea14f75a7a9ca2e9fd4575762507c583ebe97f2ae6c09d5dbd5b498b8bc6d5d94191c3c47f5ff675af0f520889e2cccdd956095caa33ba9dd2525d2038a0468a6228ef4e959d9be744a38bae98149cbeaf9551057c1500f78bcb2a47243470ba5aaba04473499515379c9fda6173222f991933f3cb74846259e520770f75921d469782718f8feb751bdcf8c1756f68fc19df3b31d276d49d37496e22941edbf41448bd6b3381c828a70e65c4cb8453526e7e99549b18fffb5d528d4d13e366b3c545738881684708ef368cf264dd5daaf246bd1efdf507de0cd6fef0a69a193512ea642160be9f0783586ef698c13579f48ac763cea999b44b7023c89c81ca85917d00f15987c8fe34139c08b3ef8c272916f7d93f9818dae2201b97cf9e2318fb9882258cd22c309c8bfe638cf1036f399e2106cc310c9817ca89f002cbd024fcef0d521efb8f0e8d39a8bd3c3984e02a49e03d187894567b668921c974259b0dc93f7fd30caf0910e4a85af60915a943f5329ba7661f876faf88c9ac31a6b51c0da80915e2cccc566ef3724d37724656f9257a7f41984212299d95db543fdeed54c4ea2a86dd438a11fd5c9977a910e9a759a99d651b7009cdf783860a79e4b54ecd9023b44dae337cb94bf30b2e77fd7fefd1e827729613194c5b55ff847132df74cd45a73f5ea6771d33724d65244d4c6e27fe9dc59542d1c390dfd370e17f92f916f7e12771c3653aa49f2b06ddcd93933d6b2b0d7f978007207416ebc40d82b3e82efa4588be6bac421e0f9f22a51afc695d444eaea2f74ef65055ad82e252bc231fe6bd1c4c07c0d998aaeb3035cd9dc3e19527bd186ae8e0b76fd76ef521a35ad9ba61929cf1ddaf298ef811848df4264070696c6559703321cbe3573b06bab2fa9ddccf96c2b812ac79ff800b2569523dd07f9e1fb48f2c1394c1d46e4648bb181a28dde69ed835a97712ee733e5941ff2b7d680eb55822900a3204bc89ebccf2327b530ca8a758f7a93913fee9419904a816a79454f3c8c08628750e7ff07f60d49d8e730cdbc1cabefc9e516e1047441a4477a8159ab1524e42796c0bb7a1a9c7c56da3a8958f153325de6018e6952ff7dc84c451b24d8805decc23411c14a5b234fcb623736cfdd1c1dd0acba0b0dd35d9525ebc5b52dc3845b20d0a3b5c28fd4cd10710ede6b885cfa20caab68bcdb99a088c6fd05c5a632f7cad35bff74aaa945cd1b5739bcf43970085ecfae3f3f19544b2b789ad4d4da7f4a906b280f86ca005f863bdfd25243b1df55d0d86e30736f49920b2badd7d9dfb6f1878884eccdf0dd8c771cb659774eb1d4f836133ac71a4446fc0a2aace1320b8b3be2c4dae348d4db6104e2ca6b475faef25933312b9ea039572548a9e5e5521a6f3577bd1746d1688c741ff32cd7f6f34fa70c0f916afb711a1b615099de9f215583acd225ecf88a5713429fc5f2b21c5b45407c438ce3a9b2c1c998e17db2c2da80a497da610007d9ca659b77cdc4b1312043b18484816027ec96b8243f4bd7f98e6571d9480ca7cf0cea0415c92fe7b3239f9ee928ea2caa1cdba28674e3406c1ae6df42b5d6ec7146f886141fd1040732a23582a2bdcd9d5e7b2bb07a58238d428dd397a53af5ffaa8bded6f4d0ea57010c4471b43fd465a0d52d3a71e70b2802d6da02382fc5af94b65c8add3c90ddb5a1e758af778c1a7293b3c06690dc1aa5d1c943f0d95211fe931a3e097aeacd9fe9cb71b9ae7beea311a0ffdef7cb4a11f3110e250adbba81fcd891e697b8bf83028fb709321a5b4dad5c1073cc5b8ef128ae9d6fc4e90474a2e28f810284b5758654a8b6c84e0c8023f5b011cb50d92a78782184577e2f323c5d2a215c46ec6adb25f243a64f4465c2d822c8b5b3c9273d9d8a6bc54f1c3498768209463cdc6dd019c943c95652e431de2bbc99db61ddb00bf5b35373859b601df06c7671b9bf1a54978efae20159c75672d643f2c5519dd5754e04f5045d3b97499127023e9b25db68bd9100bb2d7e002a07d574901980d10192253eb2d12932275b3c8263e4de607a9b0f1ccb754ae95455b0888042604b2d15badeb5d776dd33d8b5507a49d4fb2d9f2c51fcf6d36d897899e612cd26b3dbc13fda5bb1056552df34c8a3b842768057b706076859d6b858d82f41347fc0708485b9371197249ad258c481923bffc8e1a6c0e32f1194149b0c4e677a5079ad8d923942ef4a8f3d1fb0bdaa0c5ba416d1cdaea367ec12428c3bcb7c6427e27cc3ac22b36468ffa019cc056ad536df0885ecdf5a7d953245113a9bc0893ff5f6b1ce2069a57407c0ddc8f520b249f388e96d06354f34518bb33f51026e46e4b59796c4bc76e53f24379785231903126a06ae2ce19b156fc685691090a41cff136565501d952193c959ff88982fb86a09fbcedf4b8e73bfb71aaba8ad4ab4211651777063c3fb5ef93569b7cb2277e2edeae3482d310327478c0c42a2f82d7c9058851bfc78c5aa626a52e0e71f0198680b95a58b20ee3fd739da5cdb7a8254aea01d66aabdb4e4a3e4e9b5d4e31bc87ff800a02bcac5678b3bae636a636b8fe09243c8cf86394f9d8f75d9de4135c2334c0970ec64904a5e24eb0acfad2d69c911ad782090308df8da44eb4e7ee3deebaeedf77060b079637c654b068383c44ecd6ee1440d5014b357a5e01146dde8bccf0fdaa08d9b34199c3e921fa93a6b87d0579c4861ac5e72e7fa1bcbed8449286be6eb2a7f4f0807e9fb60ac50b69d8e2f45ba617a0197790cb2358e60bdd642eccbb8344f734d4063355166483bbe2d6d6f447abb9c741c3d8c6567b7af5bb0114388ca2b1a6e354d283f0958f7fd20e2efe79568c84cb87e9e3addd8d3963a316930397a88efb237dee30a77f0132a9d3a4876b463058b13cc4e41b9eb0cefadcce8dbe5a7194a647d6a08452e48ee2ac6c677a297f940409c28bd4f5e891f0ce430bf92e3c2c8376588970505119363265521e1c9e31982ed8ec31213adb18027a4d08a76e8d6d0f9862fbe4f54637168150907855b5bcc30f6ed32834ca5f59e421065a174bfcf961d5a61c08b764ef852c9fb0cc853da49d8ae7b4d414d458f0af43473eeeabea3767fe3cff11cd49eaa4f837eff11c3ef5635d33fbf136afea037f6ac56b8a3a872cebe66b498111d255db847342b09585613a04bc4978a739493af0d28274b8e9ec3beac64f356d5ffffaf5a3e95dcc24b581c7b51f3df0fc172bac89ec2119f2eeeeac7f70b9f9176d55b0e5249a1c07712c2d20a1ee96c85d6fa641a2036cc7988f5db015e672e20acc734a04ea41c389c70280c33c162e3f77ac9ef854c833f20dabbfee19428e0b9754d562d1b285ca7a89d6d1d2918b1860011a12cf3efb9095566c25ddef6c262957f1addc096de793b86bf4c741193dfde7f00870a2f9b5a48c273dee9be5dc859b54ef42599746e9023f3d77fbfe4b75a356aed3ed51985dbd51662eacdbfab34b27cc93f99f1f553c2bba00adc0f0b000ce26b770ef5e9b9a77e8c825c42bd981b6fae5e83b9c9aca71373a7ebbdb2e8ec50d059ab680f4e1bd3a4ff16cc06300d801021674a7c4807c4d0da32007f4ea75218913d7eac0ea9f9814999714b844231ab84571d9facc11ae3c757c5b648985eb57f0326cf4e710f677e3dd741736e8047bc9c242138518b1291ffe84bb73579ed66e32581947d58ff13b9084ccfb7826e13875107f460e6204ad4525b3264ff9e0c0e22c4a7bbc7fa57718f65e915acb4e9322162f45256701ac7c2a809aeb98f4b2a9f13978464ea033a893677d7bf411322eceaa8d1d170c32a7de0bc2c7d8669be207963b1b7670dc4e1c6814d4eeddacda82b998996a68a9f9e4a122d995db2b5c9b044b8262d081fe516805b68aeac7dfc286cf64d642ac47ca86f0ccb3f447bee2b8a281d627bfab5a8cfa1303b1a2249e34c9f591923fa1af08a1ee83eb3a7e73e4c4924a96f748193ee3dc91607e77341dbcdcd548fe9c167f7db0ae5440715dbf651692bf0fca58e0d8cb3680dd516d71b030899db12c1764eab95dbc64b5fd2cd9d44d1f881ef97a5f5db46bfb23b41fce66127fee53bb3156e8993fd42664bdfeb6c85b1b1a9bd6984be915e8310f5a6a1dab166ed5889d9f335d37152cb274df5b0bd9e4b6499eca9ed6d9b73c71f4ba3b8365cf73203f0675d0bd44253b79697b37599a3d3f33e124988aec655d916c0cee07fbf5af1e8226a32dd93c6fd826bd7759d5d0233b93cfb59e4912f053703f49a4e9bffb39590d262de47c844ead0d53712789cc65dae00e0c8b8da8e4f8e0f8d1250b20fee2a9e7f0023b815c8630243d6e3954fb2f6d817d8b59d4af0f7e92f757e8f81a0c0993024fdd12ce94a4a4fa0c2a76983678969690dd0b27319d50117aeaf9e6a6e5d1d0375d464e2eea807a09718f173cecbb73310b7a7da926e1f1408f12e3ef81e6c842e5e49ebe677bac17030b005570a1dfb1ad2130ceacf33dd8777e255b84a2d9485426f66a60948ef4e2edbf85a3af27fa583f378c91852ad86972bcf56975450c1055b8c9492dbef554401cb72c57083355a48288cc80e49fc0f06582da05586d19afd94eecb26620f25341794e743750f06cb5fe8dbf23d5ff50bd272bc368483b4c689abee07d4d7d2778b44e1e595bb227116cc519851906948e2cb246a9ef9323e3006f50d51f427434d3d18693cb84f419f5f098cd3752da76d4c549add9265e1f32724f13f5a951fdd097f45be21263e2336ae65141d6b06664e96cdd557296aea807c410bcd576f4faa99674f5d5921043c07dbf1cb9793106c0d8f5f1a4ef3e0ff3bdd93959cef5bf81e1653f7703a07b94af7a492d8289b003c4e1510e6d8746616c0208305856f092047f2bb5c6d727f3fe46ba0c47d878e26013dcf785190bdab10d49d1e3d219aad47168c02f241fdcc91b11b1859604516c2b2f9713a33950279cfe3a9689b16cf0ed8a7c731af6f902203ca890f375d6868a6303644c100a67a3da1e9e1b5cfd057ba4b92f06a41d24aff06dbd2dee840b637e972b918da31fb4c3583975b3c53d330f4c248ff0ef764bcacf60f65b77fe60d03a5d1bd76d496d9d5a8d6d46896493c0c97ace5f7b1639d3f1e2aa0bf7c4d8d7666011f087dc0eda0e3b8b4673f5f86afd578e8ea1d9ea1bddd3599de19a99af7631184067fdebf871b4a99f883d634fc554ffbca1eb15c23273dbff5384304252469844208fbba4bfc6b902469a55be5d369f249673e6ed0117fe3bc2623cdd7204f4c2a76e08b74a2484c43456911e57752f40edcbf19d5cb5d353007216574c5fee8b9a88e01f1db1da06a6311dd850c7e1502c8e00137c5ff20d53463842b072de7a8a88f7032968159624fe80e3a33af1dd95353f0d4cdb9484d242118bfa71f850d1db1a03318a7459458d3eb92319b45d0d87be74b3bebc50b81eaa4cbf25737ca255973e1e10d945cfae4f503cef5ba996901f6dee18b49809f2acce0c31148d3ff964b6fa6997f92950208afe78cdd70a0df5156f9c683e8d1de58b8de157fdde76f92c8f12a62a2475651ea4902709d935353dd3e7896ee9351689ade586710cb5e0bf13304472f3ae6642a53579022b71d19255252aa26e23efc7550cdea6e9a72fbc63f611a8d23658126f8248b43f66", 0x1000, 0x3ff, 0x0, 0x2, r1}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0xe, 0x8, r1, &(0x7f0000001680)="823a14d10ea2a662decb88832b45d80e43bc2f96306cd3508412d371ee08889ad279d042034a01e0f8f737db7868bc46cb8fa37e11f01ff53e5943abd2ba1e90d419ecedcb88c78fc6c570bcd6ccc6520585a986f90b3d6f2840a6a826c0d91b6c7fc29240ce1185b0cc5a1152b5890065103a6a3e0b0974b29e849765fd13d531b1eeead27328581c058dcfb7b68f0570f6bed04d4fe5502d7bc02c32b01cd146742a41c88d866d1d298446a07bbf67945247d390cb402e13d37cf6e0037c4402884588d1a1be3b3b37cc86cda3b72501df3a4cdfcee06b9e9867", 0xdb, 0x62ec, 0x0, 0x0, r1}, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x7, 0x8, r1, &(0x7f00000017c0)="da1bb381ff7a0e8b0d52260e138a37bf4751c8da65a704d4f231fb11f6b990d45ba8a8782047e062e5fda5b6a31c98486b0e12e74eb0e4f3fd4a414182888d27cec6154f895632ed98fc34968141dac6c472f5b16f9af831a9a92b5df90c0a7d63ce35f7e3490d9dae177f9385bd0358fd4bc36e79e9", 0x76, 0x5, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x5, 0x5, r0, &(0x7f0000001880)="b7199f8e47f5af0f91d7f663a70dcbf11b5ce8819da94446f3d06aed12f8b532840b0b36094b260deb582399739c0c6960d867cc3dcc78d5828fd768fe2572b4c1a880d938057f", 0x47, 0x3, 0x0, 0x2, r1}, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x8, 0x3, r1, &(0x7f0000001940)="1ace76e179f77901521f37e7b869a889895f6b909ce5e86932e4ff4905e9988928f3117f5edcefd29d6703ba457741a84d394df55d6de2880eb6fefd17cc67e89cec418be64ce65f808e5913e0483f6020663bb28aa8cc44b9095213624097c064c773bbfafc9bccae2c3b19a75b63fdf4e50d2ce43f2e07aeb1df4199bd7b0f8fe5acf1d3ae2ab629d6a8815d96e068f2e13371cd77377910bd89dd9fe08ac5a671d372f639196138d60edee78aa182caaf68cb7c94fa977ae3ebae470d651a13b9237072bc7eae3dc17b3476b0f44ccdc5749018362e4c38715d179898deca8a0c903d79388fb0c0cb1d3377bc9ce54816", 0xf2, 0x1fffe00000, 0x0, 0x1, r1}]) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000001d00)=@get={0x1, &(0x7f0000000180)=""/98, 0xc957}) 18:49:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) fcntl$setown(r8, 0x8, r6) 18:49:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:13 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000180)=""/8, &(0x7f00000001c0)=0x8) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:13 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000180)) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) write$P9_RMKDIR(r0, &(0x7f00000002c0)={0x14, 0x49, 0x1, {0x0, 0x3, 0x1}}, 0x14) 18:49:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r6, 0x8, 0x0) 18:49:13 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) getsockname$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10) 18:49:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:14 executing program 3: r0 = creat(&(0x7f0000000440)='./bus\x00', 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) recvfrom$unix(r0, &(0x7f0000000000)=""/32, 0x20, 0x100, &(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='fuseblk\x00', 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000160000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',max_read=0x0000000000000006,allow_other,allow_other,default_permissions,allow_other,default_permissions,appraise,measure,appraise_type=imasig,smackfshat=,,\x00']) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x1, 0x4) write$P9_RMKDIR(r3, &(0x7f0000000080)={0x14}, 0x14) io_setup(0x0, &(0x7f0000000740)) ftruncate(r0, 0x2007fff) write$P9_RSETATTR(r0, &(0x7f0000000280)={0x7, 0x1b, 0x1}, 0x7) fcntl$setstatus(r3, 0x4, 0x43ffb) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:14 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) getpeername$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) stat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@empty, 0x400000000, 0x1, 0x4e22, 0x101, 0xa, 0x20, 0x20, 0x32, r2, r3}, {0x4ce9, 0xa4, 0x0, 0x7, 0x132, 0x7, 0x0, 0x76ea}, {0x3, 0x7fffffff, 0x1, 0x5}, 0x9, 0x0, 0x0, 0x1, 0x1, 0x2}, {{@in6=@ipv4={[], [], @rand_addr=0x7ff}, 0x4d4, 0x33}, 0xa, @in6=@loopback, 0x0, 0x0, 0x0, 0x3, 0x3, 0x1, 0x80000001}}, 0xe8) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) fstat(r1, &(0x7f0000000180)) ftruncate(r0, 0x2007fff) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:14 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000180)) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x0, 0xffffffffffffffff}]) socket$netlink(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)=0x1) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:14 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') umount2(&(0x7f0000000c80)='./file0\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x2, 0x70bd28, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x884}, 0x4085) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) creat(&(0x7f0000000180)='./bus\x00', 0xd0) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') write$P9_RRENAME(r1, &(0x7f0000000480)={0x7, 0x15, 0x1}, 0x7) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="fcc6a3114068447830ae493366221dcafc94594e20cc9d11c9d688d2dcf8eb79984c24f2c0129b1a8da8a10d9fba75a6c959050563dfbd48b494375c030c0a267cbf2e39ad88127577d15f623b791c578b49346ce166c344c3e958d265c4e019e20fb7d827cbb459ac04d100fc3112f6ac2e8e2c733a5b81b408fcb68f166fe338c924adfb74827453a596d06589fe6cbbefb5aade14a183d493cbce2481d45c1a9b4593675a9753ffc93044784fc2c8f524a61ed5539f1b142f76e88b8e57a245691ea7b8e9e84c84d66ced1d9b150ac86d6e0a7bb2d8504c287d9d71d0bc1a2842474186", @ANYRES16=r4, @ANYBLOB="00022cbd7000fddbdf2504000000080005000000000008000500020000002c0003000800010000000000080008000500000008000100030000000800050000000000080007004e20000014000300080007004e23000008000400ad8c000008000600ff000000080005000600000048000300080008007900000014000600ff02000000000000000000000000000108000400ff7f0000080001000200000008000400e04d000008000500ac1414aa08000800010000000800060000000100"], 0xc4}, 0x1, 0x0, 0x0, 0x4800}, 0x801) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) 18:49:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r7, 0x8, r6) 18:49:14 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) r3 = fcntl$getown(r1, 0x9) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) r7 = getpgid(0xffffffffffffffff) r8 = fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000003c0)=0x0) r10 = fcntl$getown(r0, 0x9) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000500)=0x0) getresuid(&(0x7f00000048c0), &(0x7f0000004900), &(0x7f0000004940)=0x0) stat(&(0x7f0000004980)='./bus\x00', &(0x7f00000049c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004a40)={0x0}, &(0x7f0000004a80)=0xc) fstat(r0, &(0x7f0000004ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000004b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = openat$uinput(0xffffffffffffff9c, &(0x7f0000004bc0)='/dev/uinput\x00', 0x2, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004c40)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000004d40)=0xe8) stat(&(0x7f0000004d80)='./bus\x00', &(0x7f0000004dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004e40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000004f40)=0xe8) r23 = getegid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000004f80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004fc0)={{{@in=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f00000050c0)=0xe8) r26 = getegid() sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000180)={0x1c, 0x2f, 0x1, 0x70bd2d, 0x25dfdbfe, "", [@typed={0xc, 0x77, @u64=0x1}]}, 0x1c}, {&(0x7f0000000580)={0x5ec, 0x38, 0x612, 0x70bd28, 0x25dfdbfd, "", [@generic="2742534e37f7562ea639cc2b9f0a9e925b637c9b5309d805e6ffed0bc2bebf446489ca3a", @typed={0x8, 0x6f, @fd=r1}, @generic="8c83e90a160580cdd77dacd7a60f7a2869fcf6ca0d01aa9b0407dbfc8aa696dce623780e355324c8647a1c8d145490ca467af4a6717a54f40a01130552165b0d80288b0b2b2f7ac7a27ab5926c13e130713f078f7d4ccd4d717949d55cc59746904b849b096bc322593e718c3fc6b023e1417021cfd02fb6d2c48565d51f12256ca81dc2fafa6e0a5603eaaf126cf851d6dfda99e0dccbec95479b1735577a10fa0aa85dbeac93c0963e4912b9c6920ba305a8f5adfef348cc5adf42533fbe4184c8e8a2bb4a4e9d51c66a2295afc3773f4ca495a671c4c0f0781f9054d68c86b55915212b3a921b4b6ca8af5b32eb4e784b", @generic="3224e0cbd45adad10c2ad7da18f694b53072b4255281aa2eeb50cef5988e1087d534ba7b608f224e776fdd63e2184e555636167d6acb20c074ff6841ab0491f1450bfcef302e7639192690c7788deb53a0088067455c95ba5a13129d96976e44f45427c316fd29e511aab195fb3e744a6c02782c851accaaf090666b111fe0b5a4b0578ab3d6c58c08f7f49c31043816f3764e8b2563a07a0596fab0fa00", @nested={0x1c0, 0x73, [@generic="d8e56e72f5e5614e4bd6684820eb635dd41781cbc6c28501f4d44657c37d3e28ce9c2a9fd0726d997b790d44021d35cb36dbd35bb0d5e7e8be4cb8275ca7e32407aa37bcf64fc23c6a4f54700156fc85376c9594c3a6918cf26a3e8f71d86cf4bb02134bc2da9bef1eece477bbd934b327ce2a6b63630be64b38ba5a65b32fd01a85a24d433a30358544959384b765a2c6a6d5ba11bf872282d5211bfc27843c0f527219b0ea90de50cdbbaf7492ff04538411b564645702617b44c9bfb4af2c4d9f9687a1ad74c5c22ca570eea339603913ad8cc54b75f408067f0881a57340cc778ae4205534da", @generic="a741eb1a1cd23d6f91d876b26be8814f9f2bb6b7d51317223c062bef822bbb9177d1584a15184a25760172322f9cbc4fb11e7db0fba465630566d02d49244e13b8e40244ee4cafde9ac19f429c4f4e3e92aad83c47f0a284f11daacf56f31450a3d76e13db75de8a1256d72c8e28ff96f08736ad779532773df18253244c89a888a12a9efeff5e08bc406fd98e37ea47c3b90e18f2f4ac96130e1fae59849dff257dfa63f2485ad147e3e9abf4f676bcb524d88df1287cffebdb3df9193dcd41c9cb585a708b879e666b4e1db5be1ba216"]}, @nested={0xfc, 0x71, [@typed={0x14, 0x3a, @ipv6=@rand_addr="3824972883a8803d8c35933d1ba83e9d"}, @generic="1ba2ac0b85714a28411972a90d228e75119b3fd75c45001d7b0440ad9ab5fc7c2b16baeb50c7ac35e511cae7b1aebaaa4b2043aaefd28ea1b769f4c6ae4563ea4bdf34a7c8426a7dc86d4162107783e61c74dda0ae02e97d710a3be3e8e0e3d3d893b8eadb74a13324ded342a19d84b2250ee86db6533cda0b57ecc1e3507ff8b82578649048b7dbeb93828f17fe3e00778347f993e16b06df536c9b2afed92ead085508442f49e0efda4fcec80747e8f6086ca63dc55bcc601f6b9c8016c897a52516444be6bd0b215dc55dbe10c3926cc9ec837c5cb2a1374c", @typed={0x8, 0x24, @pid=r3}, @generic]}, @typed={0x80, 0x42, @binary="a3bfbb869d917b5ec85e08ec15d110edf8dfe14e13570885623d24822ca16e72ac7d28c51b27d27906f0ec0d920cb9921c7f57c5be4f1a61d32d783630198760e4125e6a7d384f681f10e26f505fc031da17a307743b0aaf6040e83b26d0c30ff00839b8ecf498d91af7e1f2725543d5978ddd79527ab85a85"}, @nested={0xe4, 0x26, [@generic="a4b0a1a839a3fe2d259524207037e65a52f22ae7c135b34166348ce738e8f21d650e2dc1a8950c4cc66e4acea01b79c5bf79704a58a346d7d9211d36caf252ba25f2b84dfc80f7e09ccae03c954926926d9fc4334e16db3b6df3b998f3f8d5fc0246e59116762c05fedd3f364b747b5b13d01a947526e8654c6b08b0ed748f19a72019ae847e01975f2edd96071557e574650abd547ea9cbf5e87ae9085d4eff32457f7b7bf2c3f56dc6cc1c09b06381922096bbae08afa895ff32465b8462c69934f69de4ff03f58e7500e40da1a3a2cf78ebc79020fb86f2fd4c8255"]}]}, 0x5ec}, {&(0x7f0000005280)=ANY=[@ANYBLOB="52f2e9d80000002f00000128bd7000fbdbdf25bc005b0004006d0008006400ac1414107c4a449ed25fd3ab0000be2ea1cd494860750381830b615697f6c9377986b1e34e98d2e70afdfff0786c90d76c4a01a1bab2d433baa822cdfd799ac43c97df5e921659873c270bf613fc79c92c8aa957980bdd31abd176725589c1d86f9cba5645577fb67bd7029e298555c1435d63bf4d4833882c207c198a2101a06467d717464047c76d11919f0e6bfff84e7696a512e18fa782c4c2995ed35d5108002613", @ANYRES32=r0, @ANYBLOB='\b\x00Q\x00', @ANYRES32=r4, @ANYBLOB="73eadd2ed0699706c0786476"], 0xd8}, {&(0x7f0000000b80)={0xdc, 0x3e, 0x402, 0x70bd2c, 0x25dfdbfe, "", [@typed={0xcc, 0x44, @binary="205fdbe986a7ffb255a38836bea9f4a21f5b5a87f9a4deba9ab55a3b2daf37db86363cf84e1e7865fed4acdacb61c557ff0303b5b71eda886370afb83ff5f6f1dbdd4a34870ef23a45b8e0fac8dec89204e4d3ed99b40c86714b20c4c7a341c02519285b222a3b71c197f61e0656acd1c74b3b32cef90b3113e2922f546373104ad270a0cabbeb25064ca2df2744fce2925a1a99bf404dd937dcdbd25b91af3a381cc37057763025e12cfd4c54d5db5e550b029594dd2dd4fa46b7e878a004e66ece7bc5844b9d"}]}, 0xdc}, {&(0x7f0000000d80)={0x35e0, 0x32, 0x0, 0x70bd25, 0x25dfdbfe, "", [@nested={0xec, 0x29, [@generic="01ce8b2c4869170adff138d598b501c0617ea767f6e97a5474fe4779a568c301ab61726e90d351297a340a2b4ae21d9670ae4bb12a29462753405612e92361b1a6a2c37947a336462099a53a00cf2f", @generic="275f09556556603fa8abd89475fcd22357f34563bb44afd7c7f6afb1812e178b6b149a10e969dff369718a08858f2cdca5369dc8588dc0567fdc5d5ac3a8d3cadb2341662bca9d2c5454eb7ddaa9ddebcb5ca5d7da805c874912f95c2d00a5be847de5b8956ff22ce2cdd7452e2fc0ea21a2bacf39c4092a8581add4c8608c566d4cc98f5078fd24bef8839de9a57d63add1f27b98fe5100b2"]}, @nested={0x20, 0x78, [@typed={0x8, 0x6c, @str='\x00'}, @typed={0xc, 0x96, @str='rose0\x00'}, @typed={0x8, 0x69, @pid=r5}]}, @generic="cab1c4a63403e4509be2034339652337c55d9c651139fcb47a2457e812c13fa339610bf9c4a73cb7920ea5173c24e1a8ed284cafd6d6d8fa977903c4aa11d6683bed9ef5d86fcc376f5e8379", @generic="e8ecf20358cb6a160b0c0928bc6926ae4f6b24968f2a44f7c0457ddd4b550a3571753359211bd7dc615d785ff2a56387b116e40a93234630c9c70e31ebde06a15db7d5493a50dc17", @typed={0x8, 0x8b, @uid=r6}, @nested={0x12f0, 0x1a, [@typed={0x8, 0x8a, @pid=r7}, @generic="55e095a24d0ee76434a7aa20dbaf756737706988709a7f8c1fd6041ddafe51e75c371ae5efc80158", @generic="9d4338d1a0e27599e83ded6cd5a8390b16116f72d4a7e042660e9965d881a9ad528a39f6c41b1d457096dcf22a9210b642bbbb50aac80694dc3143848df8b2cd1984846f8cdabaf8f7ab2ba0fa50bdb0ece56f7ed890391abff5e8b3dd991266260e83164d34a17cb7736d944ff576bf65eca214675872ec20a1c49dae6bb895ccff5c1ca60cb457128751afb8ec087623b23efcdaa5c6993189de23695da266ac1130ff8d980d46a5056e641bd89ab84ea006f8ab78809a66f721c25cbcdf85ae4b3c35b20ca1e3c609a9a3048b76beac21b4834c1c00eb763a95f4aab2c079006fa8f6f15656855326caf4a0", @generic="d603a986ba95673053aa13554fc6e4df2fa35cac25b0bdc371523c9291a9494e125c3bbc6e8988f3fd960fe0e76ea68b0bc8a76a38d08aed03753bf132af46f3ad8db954a3be4c17afca41d0cbe15b15d9354c0c852e19192f0990cd1f921d540104b6996a603eac48aa2b33edc502815720e954ce73733c5ef95b0beaa3f7aecc374780cbc758f865c935ad37895681b82994deccf9661704", @generic="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", @typed={0xc, 0xb, @u64=0x7f}, @typed={0x14, 0x5, @ipv6=@mcast1}, @generic="e2a76435a20a18c33c76723b79e2c5fe662a5f81538f8d6562319fddee1a950732d653dac905e9165004fbb8da46", @generic="27c5d0d1e4c237c3aad70ce378ce142836956c328c0bbc89a836da1f2672bbbe171bedda4929a1d34b434b1b8d", @generic="a335934d6c78e3941c635bd914a7b62e341fd8d7722aab65fdcf49ba0cab4c99e3d65c7d633312323f637e49188d3fe887bce5c51fc6cb3f57cf5e6fc92c6b4e1bbc71827d2dd7df2f8adaeb09b3ea6fdb6af1bc947ffa8e7541f6b3f89be0c678d6ea4afb8ae6c5bdb4df141dfd2adc19d3972efafade849c9722fc890f575ee1ba43edf0c790a4d9d879e218fa803e77d604886e7e1a6932545c1915b0c95a07d4452b3873ab18656c0ff9ef8c26093e1155ec0b6c5d9393"]}, @nested={0x20f8, 0x0, [@generic="a04b4756c0cc9d41fa", @generic="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", @generic="a334c49afcfa08eee01774a15c2f9bd79a16811348a81f206eb99393437e25247fe6a5a59a931010d518b512b2538bdf1b2252ef5532806d48ea84761b56e8c6d9d585260e5adb2e089eadcd2af897738171ad9fa2f6f73d442998631ab267193f70493af8f0c12b554fc22621dcf4cd4087360b8b44b5f6a507df90d4cbb7187a36e83de9144cc696fa39bd89e34a0426ed9aa7924ea49b6d67c7f3f8bc4e4fe5d4ecec71837bf3f93475158b05a1e462dfb145250f1e0a3195ca0e709deb2f3d3f544e439e8cb41e4017caf59bf65096905baa0ec480734361f8d34f7e9a37a0125d4b8a38b066ad", @generic="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"]}, @generic="08fe934e2d38fee4d5139b39940d2c549b2c19cabc69273dd010c280dc82b0b31ee008ba0d1e481426907cb2388ffef7586932d8ad2369e5bb1c79bec4ebb020"]}, 0x35e0}, {&(0x7f0000004380)={0x51c, 0x21, 0x10, 0x70bd2a, 0x25dfdbfd, "", [@typed={0xc, 0x3f, @str='rose0\x00'}, @generic="b409913cc7ee4b98c617de7d757b09f6d065cf82d5593ba644b4266972eabc9fdade93d17d4f8617950997516c009cfe98abf9ad6e393dc897ff46653acfc3a9a02b79317edd795c10b378e4ae178530cb0258ac70417ba7ebf2c3fad872af5134f4f9e96d4d9c5869415f08bc836383476b73600e307a5575d6a61a6674df8c", @nested={0x74, 0x87, [@typed={0x8, 0x8, @str=':}/\x00'}, @generic="84c5428d1ef7b621818e9e0ff0ba34e7d9df8d84f4db13c737f236eecf79f7c2923b6a12c9c021966b225f102d7e89a1213bba99d08ce83e3d6aec84950625a9a69c737dbf5f324a", @typed={0x8, 0x978, @pid=r8}, @typed={0x14, 0x3b, @ipv6=@rand_addr="0c4195cf36d525f612a0f2a7548ce24c"}, @typed={0x4, 0x5}]}, @nested={0x130, 0x52, [@generic="754467bc1cd3ded32b8cb14d54f7daa13df674114218698c715d0c740b762a413417ef5398b5ebe5064a17249c1745afa3b5c041591b14fe1ec85f187f462f4a7bbd79cf8454a2481a2d71b6", @typed={0xa0, 0x4d, @binary="b356a5135f275cf357f3696f44a100c54a1ddd933bb56f2b0a52261f8f1f7fe251a1fb5500120a7c41672c222e387817c1f8cf80189c279cee25cab9fb6842d85422fc542f8b21aba04e6c42ff8c89972532952fd95dd29aed0e3aa6f6dbca66b2a52fc1aaf85d161f66becb96f32c5a6570f1bfb5e3da083d2186591f2f6d6835f6d5b340879ceddbe4654c28b96bd8df75746e7c5a3e0bb12f19"}, @generic="3d02c7448325e65521399166988ce1a493cc22d51112c87bd55f4aee4f44aed46084bbeafe98d811781d22f1ff054e0906b5243875ebf180f23338057cbfd5"]}, @typed={0x8, 0x40, @pid=r9}, @nested={0x134, 0x90, [@generic="7cf28ddf11b12cb71c75134b5b5eb92a6cc6308bf8c4091ef80e3fe12422f5c11bb4e27b6d360fa18e14271e7d3e462009fd6c1c3abae25a5dbc966d0089d2a0833c69f26d37ce759a7e1006284236be79d8df02aac993218701f7e6de99bd214de4898f0c6197ecc25f98a83e454a998512", @typed={0xc, 0x7, @str='rose0\x00'}, @generic="86cbdb0639f2f4e59bc9aa12fa741056d217f200a39f089f74611e07103af593cbb15b8d14990f44fb65987c759eb3afb691e9e39f3ac14285189f755c23697e8ce66ed7a417ce8ac593e8e6232331fc0164eb7752b51d68ecb1c6cc06bde12a72309012f6ba07abc0177705d42aacd14bb7bb6bac46f5223d30a78d9fa3cbf4a4b53b461a2cf25cda9738bb10b1d085455bc6b86cc3ff81aef7175041cf70fc42d552a1e905381495224f74f914", @typed={0x4, 0x7a}]}, @generic="809f3b1dfc8be49ad262a18d07122a795857f42585831fdeee0ab92330ce94d97d7e118c74935850dcf349e3f54fd9470801c34daad4aceaf5d3a2328ba2", @nested={0xcc, 0x22, [@generic="dd5c46d2e0a4e7fee29cfe09730c82c2659838c52d0bbe15ef4623a0f3382a950dbf567c7df41f544980bfa9c9e8a2cdff858ab044aa8a81f79c89cffc6b3be22fbfdc1bef0072b841d44796d7846ea09b2507aa7d512c6ecd206e27695eef889ea1b16c090ae4de096f886b298405ff222834eddb171188ba82af2f6cdb775f6a39f43830ac9937825e1b2b3ebad7b0f782a960f57f59a5df82a36a5bd79226143a4141d5be05488b77d95ef02a958755877975d34bfc872d2633c4c2e7bbbbd51249", @typed={0x4, 0x1c}]}, @typed={0x14, 0x69, @ipv6=@remote}, @generic="cc6f8b2d4e04e94441176c57626ed40189c41a71ce0924b6a6c9180abc8b83e7ca5108e041866dd626212f2fd381a8eff731dde5187264e150f14fd4cd7f0e8b93c88ddb6e83a7e49d189a0fb6c27a39227beb58139ecad9a8e456e257968c483a763ecad44ac9bcadd02291bc1db5cb55c1d47d52ca75cb4dbe7ac63c7b724d"]}, 0x51c}, {&(0x7f0000000400)={0x18, 0x20, 0x702, 0x70bd28, 0x25dfdbff, "", [@typed={0x8, 0x67, @pid=r10}]}, 0x18}], 0x7, &(0x7f0000005100)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r17]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @cred={0x20, 0x1, 0x2, r24, r25, r26}, @rights={0x28, 0x1, 0x1, [r0, r1, r1, r0, r1]}], 0x110, 0x4}, 0x1) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:15 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r1, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x24) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x2}, 0x14) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ftruncate(r0, 0x2007fff) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000180)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x200000, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1001, 0x0, r0}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r7, 0x8, r6) 18:49:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r6, 0x8, 0x0) 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x7, 0x220280) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000000)) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x100000004, r0, &(0x7f0000000000), 0x0, 0x5}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) write$P9_RGETLOCK(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="240000003701000200000000000000000200000000000000", @ANYRES32=r6, @ANYBLOB='f\x00rose2@'], 0x24) 18:49:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r7, 0x8, r6) 18:49:15 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000180)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000080)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 3: r0 = creat(&(0x7f0000000480)='./bus\x00', 0x42) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) setxattr$security_selinux(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:modules_dep_t:s0\x00', 0x23, 0x2) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000002fc0)={0x0, @empty, @multicast2}, &(0x7f0000003000)=0xc) getsockname$packet(r1, &(0x7f0000003040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003080)=0x14) fsync(r0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000030c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000005ac0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000005cc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000005c80)={&(0x7f0000005b00)={0x154, r3, 0x414, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9a}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0xec, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x40}}}]}}]}, 0x154}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pread64(r0, &(0x7f00000000c0), 0x0, 0x0) sendfile(r2, r5, 0x0, 0x800000000024) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r7, 0x8, r6) 18:49:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r6, 0x8, r5) 18:49:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:16 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x3a, @multicast2, 0x4e21, 0x4, 'sh\x00', 0x1, 0x3ff, 0x50}, 0x2c) 18:49:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:16 executing program 0: r0 = epoll_create1(0x0) r1 = socket(0x18, 0x0, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000280)) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000), 0x4) 18:49:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:17 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000240)={0x14, 0x49, 0x1, {0x0, 0xfffffffffffffffc}}, 0x14) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000001c0)={{0x89, @multicast2, 0x4e24, 0x3, 'sh\x00', 0x2, 0x0, 0x5d}, {@loopback, 0x4e20, 0x10000, 0x9, 0x8, 0x2}}, 0x44) ftruncate(r1, 0x2008002) recvfrom$packet(r0, &(0x7f0000000580)=""/4096, 0x1000, 0x1, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x10001}}, 0x18) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x8000e, 0xffffffffffffffff) accept$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000180)=0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) listen(0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000080), 0x1c) pwrite64(r0, &(0x7f0000000000)="c8915163278e1cc97e2c81839a0569099282d2723cc496bca434253aa4a7cbc7920d89d6375a8d91aabf1db9b8a2e3b2bf93cc", 0xfffffffffffffe10, 0x0) r4 = dup2(r3, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @timestamp, @timestamp, @window, @mss, @sack_perm, @window={0x3, 0x2, 0x1}, @mss={0x2, 0x400}, @mss={0x2, 0x5}], 0x9) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r4, 0x54a3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)) setsockopt$inet6_group_source_req(r3, 0x29, 0x30, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) ptrace$setopts(0x4206, r5, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x42803) tkill(r5, 0x35) socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) 18:49:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:17 executing program 3: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f00000001c0)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) bind(r0, &(0x7f0000000200)=@rc={0x1f, {0x2, 0x9, 0x2, 0x77, 0x3, 0x3}, 0x3f}, 0x80) 18:49:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xe2f9ef75) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0xf84, 0x1) 18:49:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:17 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) r1 = open(&(0x7f0000000440)='./bus\x00', 0x2, 0x3) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) getsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) write$P9_RAUTH(r0, &(0x7f0000000200)={0x14, 0x67, 0x2, {0x21, 0x3, 0x2}}, 0x14) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:17 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x503800}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)={0x2d0, r3, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xaa}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff2936}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x48}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5cdd}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4759}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20d}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x89}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x39b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x20008005}, 0x40000) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:18 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44c00) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000180)) 18:49:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:18 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x1, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000180)=""/189) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 0: r0 = socket$inet(0x2, 0x80003, 0x3) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) setns(r1, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000b52fd8)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f000096f000)="0000bc4ffe7f00009d", 0x9}]) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @remote}}}, 0x108) 18:49:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:18 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000008, 0x10010, r0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xd37}) 18:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) socket$nl_route(0x10, 0x3, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept(r1, &(0x7f0000000100)=@isdn, &(0x7f0000000040)=0x80) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000280)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000180)=[{}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) syncfs(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000012d484f9c42a71000000003b0503000000"], 0x0, 0xe2, 0x1000, &(0x7f0000002700)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) munlockall() 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:19 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14}, 0x14) ftruncate(r0, 0x2007fff) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000280)=0x0) getsockname$unix(r0, &(0x7f00000002c0), &(0x7f0000000240)=0x6e) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e20, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000040)='rose0\x00', 0x0, 0x6, 0xfffffffffffffffd}) perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x70, 0x2, 0x7d, 0x200, 0x6, 0x0, 0x6, 0x8, 0xe, 0x409, 0x8a, 0x6, 0x8, 0x6b63, 0x3, 0x2, 0xff, 0x8000000000000000, 0x3, 0xf5fc, 0x100000000, 0x8, 0x5e, 0x9, 0x2, 0x8, 0x7, 0x10100000, 0x100000001, 0x400, 0x1000, 0x4, 0x4, 0x1000, 0x3, 0x4, 0x6, 0x0, 0x7, 0x3, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x1, 0x100000001, 0xb, 0x3, 0x101, 0x6}, r0, 0xf, r0, 0xb) 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000200)=0x0) timer_gettime(r0, 0x0) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x101, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f00000000c0)) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0xfffffffffffffffc) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000002c0)) r1 = accept$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000180)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) unshare(0x24000800) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4, 0x4, 0x0, 0x0, 0x0, 0x8, 0x100, 0x0, 0x5, 0x0, 0xc6, 0x7, 0x0, 0xfffffffffffffffa, 0x1, 0x0, 0x2, 0x0, 0x8009, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x41, 0x7, 0x800, 0x10004, 0x0, 0x7fffffff, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xfffffffffffffffb, 0x0, 0xb, 0x8000, 0x0, 0xd}, 0x0, 0xf, r0, 0x2) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000280)=0x7fffffff) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 18:49:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x11) connect$inet(r3, &(0x7f0000000080), 0x10) splice(r1, 0x0, r3, 0x0, 0x9, 0x1) setsockopt$inet6_int(r1, 0x29, 0xdf, &(0x7f0000000000)=0x6, 0x4) 18:49:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x29}, 0x3}, 0x1c) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x1) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa000a8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x50, r4, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x13}}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x5}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x5e0a}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) r6 = socket$inet6(0xa, 0x1000800000002, 0x7ff) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f00000001c0)={@local, 0x38, r5}) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r5}, 0x14) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:20 executing program 0: mkdir(&(0x7f0000008400)='./file0\x00', 0x0) chmod(&(0x7f0000000000)='./file0/bus\x00', 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x0, 0x0) stat(&(0x7f0000000640)='./file0/bus\x00', &(0x7f0000000680)) 18:49:20 executing program 3: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x1000000000000005, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xb0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) write$FUSE_ATTR(r1, &(0x7f00000001c0)={0x78, 0x0, 0x2, {0x1c26, 0x4, 0x0, {0x6, 0x7, 0x2, 0x8, 0xffffffff, 0x3, 0x7, 0x4, 0x2, 0x200, 0x6, r2, r3, 0x5, 0x5}}}, 0x78) 18:49:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000380)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000140), 0x1325e1) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000100)=""/175, 0xaf}, {&(0x7f00000001c0)=""/110, 0x6e}, {&(0x7f00000003c0)=""/226, 0xe2}, {&(0x7f00000004c0)=""/248, 0xf8}], 0x4, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="3f02e6bfc41e1671e9086af79b6833f962de2dde235ad667356952a61064bbdceff57cb8a0db92c5005d91790b70dc7a9501fd3e78a7881d9659b747331f7bfb7107895373f828758dcaed5a30547b00e131415c954ec541"], 0x1) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x1000000003c) io_setup(0x46d7, &(0x7f0000000040)=0x0) io_getevents(r5, 0x2, 0x2, &(0x7f0000000080)=[{}, {}], &(0x7f00000000c0)={0x77359400}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x2) 18:49:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) r1 = socket$inet(0x2, 0xd, 0x41) setsockopt$inet_opts(r1, 0x0, 0x8, &(0x7f0000000100)="581f95a098e5900c7a54f3b8108be5acb545aaedf94a2e52fb7199aa2d3a9c1874ad061a4be9", 0x2) sendto$inet(r1, 0x0, 0xda, 0x4, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x7}, 0x385) fchdir(r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000180)) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x80000001, 0x2}) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000001c0)=""/4096) 18:49:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x18, &(0x7f00000000c0)={@dev}, 0x20) 18:49:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b1", 0x1}], 0x1}, 0x8000) getsockopt$inet6_buf(r1, 0x29, 0xcd, &(0x7f0000000080)=""/21, &(0x7f0000000100)=0x15) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000000), 0x4) sendto$inet6(r1, &(0x7f0000000040)="ee", 0x1, 0x0, 0x0, 0x0) 18:49:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r4 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x8, 0x300) ioctl$EVIOCGPHYS(r4, 0x80404507, &(0x7f00000002c0)=""/151) fcntl$setstatus(r0, 0x4, 0x2000) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r5, 0x100, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xffffffff, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40) 18:49:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:21 executing program 3: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000004, 0x31, r0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x21}, 0x21) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000240), 0x4) 18:49:21 executing program 0: r0 = socket$inet6(0xa, 0x2000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x4001, 0x4) sendto$inet6(r0, 0x0, 0xfffffffffffffd82, 0x0, &(0x7f0000000040)={0xa, 0x2001000004a26, 0x0, @dev}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000100), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) pwrite64(r0, &(0x7f00000000c0)="af778799ef4ed830aec1090b92b79a3cfb306de90bad887b4a1edb60acd2b84b0c23c5f502e602586715a909467b7063d206ae", 0x33, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, 0x0}, 0x2000) 18:49:21 executing program 0: unshare(0x24020400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000c40)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xffffffffffffffdb) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20010020}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="000000e303000000000000008f37ca746e4935e4056c6b98eab0de6897dbab9aff5748e69afd54dda44a4e4e158cb2c2cfbae632e43bcf593b8dca0146b6d976706f1ef804b02cf18e48077db9638e8573772faf265a9d6f03bff740dea54f11e42e207a4bbd571af23aa02a841bc724f260cad88289144d135eb51b448ea125db7a9c4d3789530bdbc63237ffd4e1456fab94b5d34ce6b6159cbced900a2800a4c9b58af91b0bc060bd4646fc76e45b1a"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000140)=0x7b, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100040}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="000100800000fedbdf250800000030000600040002000400020008000100090000000800010046a00000080001001f000000080001000700000004000200"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x4000004) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r3 = getuid() sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000600)="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", 0x519}], 0x1, 0x0, 0x0, 0x800}, 0x44804) read(r2, &(0x7f0000000200)=""/225, 0xe1) shutdown(r2, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f00000004c0), &(0x7f00000005c0)=0x4) unlink(&(0x7f00000001c0)='./file0\x00') geteuid() setresuid(r1, r3, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) getpid() pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r4, r4, 0x80000) write(r5, &(0x7f00000001c0), 0xfffffef3) 18:49:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:21 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) sendfile(r2, r5, 0x0, 0x800000000024) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f0000000140)) r6 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f00000002c0)=[{&(0x7f0000cd8000)=""/1, 0x2e171c03}], 0x1) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000000)=[0x1fffc0000000, 0x5]) ioctl$int_in(r7, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r7, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r8}], 0x200000000000004e, 0xffffffffffbffff8) dup2(r7, r8) fcntl$setown(r8, 0x8, r6) tkill(r6, 0x16) read(r0, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fd0ffc)) syz_open_pts(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) 18:49:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") [ 281.915082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 281.945053] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 281.964692] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 281.984719] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 281.997893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 282.010636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 282.022887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 282.035417] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 282.047765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 [ 282.060451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9374 comm=syz-executor.4 18:49:22 executing program 0: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x13, r1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000080)={0x98, 0x0, 0x7, [{0x5, 0x7, 0x0, 0x1}, {0x4, 0x8, 0x19, 0x5, 'cgroup:ppp0\\%eth1\xbf/vmnet1'}, {0x1, 0x3, 0x1a, 0x401, 'proc(-:securityvmnet0-em1%'}]}, 0x98) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x7ffe, 0x8001) fallocate(r0, 0x3, 0x5e89, 0xfff9) write$FUSE_DIRENT(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x80) 18:49:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:22 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000005980)='/dev/ion\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1010c0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="260000000200000000000000fddbdfae4b8dc6e75602dae4e7"], 0x1}}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) prctl$PR_MCE_KILL_GET(0x22) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xf3, 0x5c, &(0x7f0000000200)="73a24cce0273d0bb7f4154c59377189827e88299f204c41c8ba7b478360489a8b5a19b4fe0523fbe92b81c01a91f691a65635ec99fc99a1361d950f2535ca973729cadcdb07006fd73fa673ea46814b018d57dda648d0302c231c2c8e22deea4adf3f9cbc52f8a96f6b123be80da46876ab04e2ee4e814b2d9794ee7a6133b42c77f74046d756a063ccc31d5371b06af0327e1952c55e91c0805b560a1370c2d562249748cd9c0fc28d4f2f248cedde97c4bf428998ae55eaf492c1aeedc8413ea2c6ffbd94b376f576e13704944d4fb3698cec0f7eb0d2da06c79f38b07eb74887f50c6298adad9f036e886d420fc2a38a59a", &(0x7f0000000340)=""/92, 0x7}, 0x28) syz_genetlink_get_family_id$tipc2(0x0) 18:49:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000005c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x402000, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x3e4) 18:49:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000196fe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)={0x2, 0x400000000000003, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x2]}}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e24, @loopback}}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x400, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = open(&(0x7f0000000080)='./file0\x00', 0x100, 0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) 18:49:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x800000000024) r4 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r5, 0x8, r4) 18:49:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:23 executing program 0: unshare(0x400) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xffffffffffffff7f) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) fchmod(r0, 0x24) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x56758731, 0x6, 0xf9c6, 0x8, 0x17, 0x8001, 0x7, 0x7, 0x3, 0x7fffffff}) unshare(0x10000000) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000080)={0x10000010}) 18:49:23 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000005980)='/dev/ion\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setresuid(0xffffffffffffffff, 0xfffe, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1010c0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="260000000200000000000000fddbdfae4b8dc6e75602dae4e7"], 0x1}}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) prctl$PR_MCE_KILL_GET(0x22) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xf3, 0x5c, &(0x7f0000000200)="73a24cce0273d0bb7f4154c59377189827e88299f204c41c8ba7b478360489a8b5a19b4fe0523fbe92b81c01a91f691a65635ec99fc99a1361d950f2535ca973729cadcdb07006fd73fa673ea46814b018d57dda648d0302c231c2c8e22deea4adf3f9cbc52f8a96f6b123be80da46876ab04e2ee4e814b2d9794ee7a6133b42c77f74046d756a063ccc31d5371b06af0327e1952c55e91c0805b560a1370c2d562249748cd9c0fc28d4f2f248cedde97c4bf428998ae55eaf492c1aeedc8413ea2c6ffbd94b376f576e13704944d4fb3698cec0f7eb0d2da06c79f38b07eb74887f50c6298adad9f036e886d420fc2a38a59a", &(0x7f0000000340)=""/92, 0x7}, 0x28) syz_genetlink_get_family_id$tipc2(0x0) 18:49:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r1 = dup(r0) write$tun(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x51f) setsockopt$inet_mreqn(r0, 0x0, 0x100000000000024, &(0x7f0000000380)={@multicast2, @initdev}, 0xc) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0xfffffffffffffff8) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000140)={'bond_slave_1\x00', 0x5}) 18:49:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:23 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f00000000c0)="0600", 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="343f000003000200000000000000"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$RNDADDTOENTCNT(r5, 0x40045201, &(0x7f0000000240)=0x100000000000a5) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[], 0x0) shutdown(r4, 0x0) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x120}, 0x100) 18:49:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r6, 0x8, r5) 18:49:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:24 executing program 0: r0 = socket$inet(0x10, 0x100800000003, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x0, &(0x7f0000000040), 0x2}}], 0xd3, 0x1ffffffe) r3 = syz_open_procfs(0x0, 0x0) symlinkat(0x0, r3, &(0x7f0000000200)='./file0\x00') fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) bind$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @initdev}, 0x1c) getsockopt$inet6_tcp_buf(r4, 0x6, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 18:49:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:24 executing program 3: unshare(0x40600) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x4048804, &(0x7f0000000080)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) fallocate(r0, 0x0, 0x0, 0x2) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 18:49:24 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) close(r0) symlink(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 18:49:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000008, &(0x7f0000000000)) timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, 0x0, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101002, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x800000000024) r5 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000cd8000)=""/1, 0x65}], 0xfffffffffffffd75) fcntl$setown(r6, 0x8, r5) 18:49:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 18:49:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0), 0x0}, 0x20) 18:49:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="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") 18:49:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x1000) setxattr$system_posix_acl(&(0x7f0000000040)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(&(0x7f0000000080)='./file0/file0\x00', 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f00000005c0)={0xc8, 0x0, 0x1, [{{}, {0x0, 0x0, 0x1c, 0x0, '+system\xcccpusetcgroup$cgroup\x15'}}]}, 0xc8) [ 284.877983] ------------[ cut here ]------------ 18:49:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$KDSETMODE(r3, 0x4b3a, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="ce85502f595febae9ed1ca53daf7b91c0ad675d343b5a02b9e4d63b6511211a5fae0bd489a8cd58f7778a0f7247fec4ef45c7928dfb2c74bcf41eeb7992c56fd4153666a8501031f38ce8652622e19c10a2f29e14cb500796c114e995ca37519445c5681262f12a524946c358ab2446e0fa93e541628cdc6feb083a7e844adb8e7acb024fcb5512cb7c7740648f81c944457dbf52008d77e53c4b9b780b990f6576d1b05e05bde50aceca35e8117805b40672bed9fa2338ecd2d952ae3343df15d0fd37eed3dadb3b28c7457d3328c5d13a4b97977f26d01d8f1d770dfd4bdbdfa22f705b1b3f01b77ddcc9ac1eb7c80be65c3cfb71ce764c9a8c8cf7b9a1150") 18:49:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) poll(0x0, 0x0, 0x0) gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, 0x0, 0x0) write$P9_RWSTAT(r1, &(0x7f00000002c0)={0x7, 0x7f, 0x2}, 0x7) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8020fc}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x7c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000680)={'syz', 0x2}, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000540)="fcace6e61d5f1b1ee32a5ba8e06f9adfcba9eee035cb2cf9b38a122497c3227ff7063c395abfd1295fa49efddcf83dfe1927602c140f44c7ac319344cef67d0dbfdf63b9e2e9ae34b2d8ba47a19dfbb6747d46d8668cc4b7370d7ecd2ae139a7462f29069aeb18804aa683ae1a392fe2b30de7da39f9e0a006d09a2c95f2810f3fba23352b22de7b84ad82609abcb45a812c4f7327730c9b2e4da74a4d9de84f79eca5d96a5234cdf4105d327330", 0xae, 0xfffffffffffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x0) keyctl$assume_authority(0x10, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) ioprio_set$uid(0x0, 0x0, 0x0) setns(0xffffffffffffffff, 0x1fffc) setxattr$security_selinux(0x0, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:zero_device_t:s0\x00', 0x23, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x1) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 284.900666] WARNING: CPU: 0 PID: 9566 at mm/percpu.c:891 pcpu_alloc+0x78a/0xab0 [ 284.918756] illegal size (532536) or align (8) for percpu allocation [ 284.928289] Kernel panic - not syncing: panic_on_warn set ... [ 284.928289] [ 284.935672] CPU: 0 PID: 9566 Comm: syz-executor.3 Not tainted 4.9.168+ #39 [ 284.942680] ffff8801d2e17a00 ffffffff81b4f5d1 ffff8801d2e17b00 ffffffff82a39ba0 [ 284.950765] 00000000ffffffff 0000000000000000 0000000000000009 ffff8801d2e17ae0 [ 284.958840] ffffffff813f945a 0000000041b58ab3 ffffffff82e2ec5a ffffffff813f9281 [ 284.966915] Call Trace: [ 284.969505] [<0000000080e23de3>] dump_stack+0xc1/0x120 [ 284.974874] [<00000000e42e3012>] panic+0x1d9/0x3bd [ 284.979882] [<000000006d2eb42b>] ? add_taint.cold+0x16/0x16 [ 284.985668] [<00000000201b4cb5>] ? vprintk_emit+0x277/0x6f0 [ 284.991716] [<00000000e23a37ee>] ? __warn.cold+0x14/0x2f [ 284.997243] [<0000000022d811df>] ? pcpu_alloc+0x78a/0xab0 [ 285.002862] [<00000000500427fb>] __warn.cold+0x2f/0x2f [ 285.008229] [<000000006607d725>] warn_slowpath_fmt+0xc2/0x100 [ 285.014196] [<00000000a88f64cb>] ? __warn+0x1b0/0x1b0 [ 285.019477] [<00000000221168cd>] ? check_preemption_disabled+0x3c/0x200 [ 285.026309] [<0000000022d811df>] pcpu_alloc+0x78a/0xab0 [ 285.031757] [<00000000221168cd>] ? check_preemption_disabled+0x3c/0x200 [ 285.038585] [<000000002c6e44e8>] ? pcpu_populate_chunk+0x7d0/0x7d0 [ 285.044988] [<0000000045ba3217>] ? kasan_kmalloc+0xb7/0xd0 [ 285.050785] [<00000000ff674411>] __alloc_percpu_gfp+0x28/0x30 [ 285.056746] [<00000000f9f57418>] htab_map_alloc+0x74f/0xef0 [ 285.062629] [<000000001a0db3fd>] SyS_bpf+0x6fc/0x25d0 [ 285.067900] [<00000000e5679566>] ? bpf_prog_get+0x20/0x20 [ 285.073522] [<00000000a8d6d143>] ? do_syscall_64+0x4a/0x570 [ 285.079313] [<00000000e5679566>] ? bpf_prog_get+0x20/0x20 [ 285.085107] [<00000000c464f7e9>] do_syscall_64+0x1ad/0x570 [ 285.090832] [<00000000c2f3c7c8>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 285.098128] Kernel Offset: disabled [ 285.101752] Rebooting in 86400 seconds..