e0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x21) socket$inet6(0xa, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000036) r4 = getpid() setpgid(r3, r4) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) fallocate(r1, 0x1, 0x0, 0x80000001) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x2d, 'io'}, {0x2d, 'rdma'}, {0x2b, 'io'}, {0x0, 'pids'}, {0x2b, 'memory'}, {0x0, 'pids'}]}, 0x22) r5 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r5, 0x0, 0x4) 13:34:47 executing program 1: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000008c0)='asymmetric\x00', &(0x7f0000000840)={'syz', 0x3}, 0xfffffffffffffffd, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)='(:#\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) fchdir(r3) write$9p(r1, &(0x7f0000001400)="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", 0x600) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, &(0x7f0000000340)) r4 = socket(0x10, 0x2, 0xc) write(r4, 0x0, 0x0) r5 = gettid() syz_open_procfs(0x0, &(0x7f0000000900)='map_files\x00') syz_open_procfs(r5, &(0x7f0000000400)='autogroup\x00') sendfile(r1, r2, 0x0, 0x10000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x18, &(0x7f0000000280)=0x80000001, 0xffffffffffffff26) connect$inet6(r6, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) poll(&(0x7f0000000180)=[{r4, 0xbf8560f3f6372077}, {r6, 0x4}, {r7, 0x1024}], 0x3, 0xae5) 13:34:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) r3 = open(&(0x7f0000000100)='./file0\x00', 0x200c2, 0x4) write$nbd(r3, &(0x7f0000000380)=ANY=[], 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 13:34:51 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf7, 0xf7, 0x4, [@fwd={0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8, 0x3}]}, @volatile={0x9, 0x0, 0x0, 0x9, 0x2}, @fwd={0xe}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x9, 0x3}, {0x3}, {0x1, 0x1}, {0x3, 0x5}]}, @datasec={0x6, 0x3, 0x0, 0xf, 0x3, [{0x3, 0xffff, 0x5}, {0x2, 0x9, 0x1}, {0x2, 0x8, 0x401}], "c877c3"}, @ptr={0x7, 0x0, 0x0, 0x2, 0x5}, @const={0x7, 0x0, 0x0, 0xa, 0x2}, @union={0xc, 0x5, 0x0, 0x5, 0x1, 0x1000, [{0x1, 0x0, 0x101}, {0xd, 0x4, 0x3}, {0x11, 0x4, 0xa5}, {0x3, 0x1, 0xffff}, {0xa, 0x5}]}]}, {0x0, [0x0, 0x2e]}}, &(0x7f0000000180)=""/43, 0x114, 0x2b}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0xcc, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0xffffffffffffffff, 0xfffffffffffffde7, 0x10, &(0x7f0000000000)={0x5}}, 0x3e) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x10000, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r3 = socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x1, 0x10, r3, 0x7dfdc000) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) r7 = getpgrp(0x0) r8 = gettid() rt_tgsigqueueinfo(r7, r8, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x4}) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, &(0x7f0000a72ff0), 0x0, 0x8) connect$unix(r2, &(0x7f00000003c0)=@file={0x2, './file0\x00'}, 0x6e) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) 13:34:51 executing program 3: ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xd8e_\x9c\xb1\xb1\xd0\xca\xfe\xe8\xc6\xb7y\xc7\x1f\x1c \x828\xf8\xa2Q\x18\xa1\xed\x88MoS\xf6g\xdd\xa1IK\x80\x13(b\x85zO\xf3u\xa9\x9a\xfd `V\xcaRIU\xff\x8a\x80', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfd15}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000780)=0x80) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') preadv(r4, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x16) prctl$PR_GET_NAME(0x10, &(0x7f00000005c0)=""/145) getsockname(r3, &(0x7f0000000480)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000540)=0x80) r5 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCLINUX7(r5, 0x541c, &(0x7f0000000580)={0x7, 0x5}) tkill(r1, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:34:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) r3 = open(&(0x7f0000000100)='./file0\x00', 0x200c2, 0x4) write$nbd(r3, &(0x7f0000000380)=ANY=[], 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:51 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x9}], 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000640)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000480)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x1c}, 0x9, 0x9, 0x7c, 0x400, 0x80000001, 0x40400006, r2}) delete_module(&(0x7f0000000200)='ext4\x00', 0xb00) pipe(&(0x7f00000004c0)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="2321202e2f66696c653020706f7369785f61636c63636573732d6370757365747472bbe4fd010cdda49c6cbc7573746564c04273656c690000"], 0x39) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 13:34:51 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x450d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141a42, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x4a, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000000)={0x2, 0x8, 0x0, 0x1, 0x8001}) fallocate(r1, 0x20, 0x0, 0xfffffeff000) r3 = dup3(r0, r2, 0x80000) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000040)) fallocate(r1, 0x0, 0x0, 0x10000101) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 13:34:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40, 0x1d6) ioctl$BLKRRPART(r2, 0x125f, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000000c0), 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000002c0)={0x4, 0x800, 0xfff, 0x81, 0x1}, 0x14) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000200000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCGIFADDR(r5, 0x8915, &(0x7f0000000200)={'syz_tun\x00', {0x2, 0x4e24, @multicast1}}) 13:34:51 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d52", 0x45, 0x0) add_key(&(0x7f0000000100)='rxrpc_s\x00', 0x0, &(0x7f00000000c0), 0x2e5, 0xfffffffffffffffc) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/sockstat6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001e2, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) capset(0x0, &(0x7f0000000480)={0x7, 0xda, 0x2, 0x3f, 0x8, 0x4}) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) r3 = dup(r0) write(r3, &(0x7f0000001300)="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", 0x1000) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x10010000000036) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x9, &(0x7f0000000280)=""/20) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='net/sockstat6\x00') preadv(r5, &(0x7f0000000480), 0x10000000000001e2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, &(0x7f00000004c0)={{0x0, 0x3, 0x7, 0x3, 0x6}, 0x6, 0x4, 'id0\x00', 'timer1\x00', 0x0, 0x717b, 0x9, 0x5, 0x9}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0), 0x19b3aef86ca2203c) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) 13:34:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x1a, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4, 0x5}, 0x10}, 0x70) sync() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x8, 0x4}, {0x5, 0x80, 0x4, 0x7730}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) set_thread_area(&(0x7f0000000200)={0x80000001, 0x20001000, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) fadvise64(r0, 0x90b, 0x9, 0x3) prctl$PR_SVE_GET_VL(0x33, 0x17da7) 13:34:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) r3 = open(&(0x7f0000000100)='./file0\x00', 0x200c2, 0x4) sendfile(r3, r3, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:51 executing program 3: ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xd8e_\x9c\xb1\xb1\xd0\xca\xfe\xe8\xc6\xb7y\xc7\x1f\x1c \x828\xf8\xa2Q\x18\xa1\xed\x88MoS\xf6g\xdd\xa1IK\x80\x13(b\x85zO\xf3u\xa9\x9a\xfd `V\xcaRIU\xff\x8a\x80', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfd15}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000780)=0x80) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') preadv(r4, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x16) prctl$PR_GET_NAME(0x10, &(0x7f00000005c0)=""/145) getsockname(r3, &(0x7f0000000480)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000540)=0x80) r5 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCLINUX7(r5, 0x541c, &(0x7f0000000580)={0x7, 0x5}) tkill(r1, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:34:52 executing program 3: ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='\xd8e_\x9c\xb1\xb1\xd0\xca\xfe\xe8\xc6\xb7y\xc7\x1f\x1c \x828\xf8\xa2Q\x18\xa1\xed\x88MoS\xf6g\xdd\xa1IK\x80\x13(b\x85zO\xf3u\xa9\x9a\xfd `V\xcaRIU\xff\x8a\x80', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfd15}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) accept(r0, &(0x7f0000000700)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000780)=0x80) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() clone(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') preadv(r4, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x16) prctl$PR_GET_NAME(0x10, &(0x7f00000005c0)=""/145) getsockname(r3, &(0x7f0000000480)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000540)=0x80) r5 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCLINUX7(r5, 0x541c, &(0x7f0000000580)={0x7, 0x5}) tkill(r1, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:34:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f00000001c0)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x13, 0x2d, 0x11, 0x5, 0xa, 0xc3, 0x5, 0x15a}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000240)=0x40) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:52 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10010000000036) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0xa, &(0x7f00000002c0)=ANY=[@ANYRES64=r0], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f0000000040)=""/161, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x10, 0x400000}, 0x10}, 0x70) 13:34:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x23a, &(0x7f00000000c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "dc0b9c", 0x204, 0x11, 0x0, @rand_addr="d492382fc7589ab45aa37d91b0e6fc5f", @dev={0xfe, 0x80, [], 0xe}, {[@routing={0x0, 0x2, 0x0, 0xff, 0x0, [@remote]}, @hopopts={0x32, 0x0, [], [@pad1, @pad1]}, @fragment={0x3b, 0x0, 0x3, 0x0, 0x0, 0x2, 0x68}, @srh={0xed, 0x8, 0x4, 0x4, 0x3, 0x40, 0x7f, [@remote, @mcast2, @loopback, @loopback]}, @dstopts={0x8, 0x24, [], [@generic={0x25, 0xe7, "a55dd7b9d6d157ca99c10ca687558e0e4b531796d5d93acd47cb1d0e5f0c08536f7562a80edc5993fe1cf699cef8f35d68972d4a29ab0f99f88d407805ec6d855b8ff53005e4a53438d91fae51a2438317836104a0e7c3e23a05b6b508f7fa945ce650445f6b214dca2178c52235016d2060a1a2c469d85e1120b4db89f9416b49c45086efe4c6f43aba7fc17cef670cbf2008605c23052641bff5d87a1e69425b58d0ad69518430e2b8efe7fce7a0ce457a5e9b176909be2ebc81c6c877556b3b65bdad8b731e48fe0c3eff4f9f2630597d6c13b36467598391370c8b1dfb740c2fdebfcae4d9"}, @calipso={0x7, 0x28, {0x4, 0x8, 0x3f, 0x6, [0x100, 0xa1e, 0x6, 0x4]}}, @ra={0x5, 0x2, 0x4}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0x6f0e}]}, @routing={0x0, 0x2, 0x2, 0x4, 0x0, [@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @hopopts={0x2e, 0x4, [], [@pad1, @ra={0x5, 0x2, 0xa0b}, @enc_lim={0x4, 0x1, 0x1f}, @hao={0xc9, 0x10, @mcast1}, @pad1, @pad1]}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 13:34:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x18475140f06794e8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = open(&(0x7f0000000140)='.\x00', 0x204004, 0xc3648c74bdf7f728) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000ec0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000009, 0x4010, r1, 0x6f59f000) times(0x0) getpeername$netlink(r2, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x4018000) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0xd8, 0x0, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x17}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffa7a}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7fff, @remote, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_0\x00'}}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x8ae883315bf4f92a}, 0x10000090) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) 13:34:52 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x68, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x7) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl(r2, 0x3, &(0x7f0000001a80)="ff5710385c0e2fb1702ae93ff2289239b39164134b7d8d725fd2063ea374185ef11d34aac842c204850e7832d0bd46fcfadbd5d5dd7708fc0743ab0647fbcc2e3a23532070c68b540fffb0caa36203e9909763e39c518bc0ad9ea888f8cfe5a35e71db404d9f3230e74b741e0b2f5349917ce2c42255816e3811d4ad47956c935ddce26603649f2202658f97bfb05c089fc06e0048a7c8b03fa1c648645bc38b65e75f24d8b7e7f9bd8124d4f002b665e574ba942980ab7dfbf53ec81cb1d102d6e9078ad596d6937fe26a9523129c22644577a2162fa1da26a10469fc446746") fallocate(r3, 0x0, 0x0, 0x1000f4) readv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000041c0)=ANY=[@ANYBLOB='n'], 0x1) ftruncate(r2, 0x8200) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r3, 0x0) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000240)=0x6) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000011c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{&(0x7f0000000440)=@pppoe={0x18, 0x0, {0x3, @random="b36772ba803b", 'gre0\x00'}}, 0x80, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2df}}, {{0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000002440)="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", 0x7ff}, {&(0x7f0000002000)="7eea421ed53761db717e468604d03c95402431e48d69e72bae56a32dbe57d0a9a1ced4520bc36cd65343c0d7ad2bc9d00894da98242bf5efac4bf93c7c9c98d849c8b7280abd91df56e9adc0c3ae93461c680de881db74e009c89f47cf2ffd11445e030a9946991422e0b8af0f6d3e429b669075347dddf35b09584013553f1254bf17753615b887f7eb2d3632c6c4a861742044c51d735046dd67000ff4433aacf5e49011cedcc318bc1e50d391672481048284ae0b191fe158295d85df", 0xbe}, {0x0}], 0x3, &(0x7f0000003440)=[{0xf8, 0x1fb, 0x4, "715e26c3bc6ba46889463d3a65f5c87ccfeb6b68b2ea519cf84dcd87d7a0bbd9ba9190df454c3436f83b8768c603a1f931b06d6a2adeef5efbfdb0158033357f14815e73cde7ba6873f5c133a98cfbc7e99e9f9930b3a0734719f4574bd9977b2eea66389aff7d09a3bb82e4f63b0c27dc7adef88199bd6f29b55191820237f465895cfdef6162b9f81ec34b5172a858110906233494a20a21086b948f433715dc644aefff7786a5d4219c88930bd61b3818014b54fe5fa2952a88558201ceb3de29110a3ac6a8602dfba78b063fdd01a9f4939503759efedadd6df408d39fe6fca1c12a0c96189c"}, {0x38, 0x108, 0x0, "404c3875d439110e4895117296554de34270691d68c60b2d417be0b92a3f4208c79291beaf2b"}, {0x80, 0x1, 0x0, "c7ed3d79d2d1dc3775536adaa7fd743ff38a1ade5273c465a7c4f78ad238c6703970debadd207a05af1192a2d2d0f253af0c09e413613c0a3428e03affc028d4f0250c4f61a419abd06dfcbbf8b274b41f5c4379cf23723eeda0223f6ca2de838d9c05976eea0246e8a9c308f3d3f2"}, {0x10, 0x10a, 0x4c}, {0x10, 0x1dd, 0x3f80000}], 0x1d0}}, {{0x0, 0x0, &(0x7f0000004940)=[{&(0x7f0000001b80)}, {&(0x7f0000002340)}, {&(0x7f0000004880)="612123082f1690b13b47ff2132fcc215d54e4532b014627c7c2a9c390ea832955e0cd84d890c20d8102349f6bb034a01309cd89334285fa67f0d02feb1cac57bd50df4f3f6f40977f4ada0bd2c0941ff24e4ac0a2fd9e1cca9b1f45a0ec01717afc82f2a2462fe0c1ae6031ed0b9a3ec6aa8caf9f9c6ce4d7ac623d512182785a7e86d6a955ef3e02082b695358220cf1fe9b4601f2bfd84729e0bcfe26678cbf0d3e704b0fec46459b534cea34339f48f417249", 0xb4}], 0x3, &(0x7f00000049c0)=[{0x108, 0x118, 0x1b8, "8bc39aef3b46e633f979ded8a7269fbb1f39bf6c4a2e6fb60236bb818c99706af5937fc91ba82b733517369e1ee9d2cf042e0d267299c51babbaaca5a627f1ca9391bb25357fb8c239575b07adcf98c47a22a8ab5c217bc734f3fc8e3920821cf35a76e87610a43a15d3c7cc99018c0711368b9debd1afde2045e8d4a2717939c9c72a43ed6ef2943b05ceb176c5280aae960442d4c02f9f3ba71565e9923edc8c9e29529a0671ef73ca4334f5a091c51e0de6f88dfa7bf4b1655cecef8559a6ad869288090e4207e3f2e0ad1818a4c56e336aac462950d78a02ec5dca7ceee67c4a5917972ef9cdc191d308bef755aafb"}], 0x108}}], 0x3, 0x4021000) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) r6 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r6, 0x0, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x36, &(0x7f0000000300)=ANY=[], 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001900), 0x0, 0x729aa39ff2309a7a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000d80)="43eabc59", 0x4) 13:34:52 executing program 5: r0 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x2) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x100, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000280)='/dev/zero\x00', &(0x7f00000002c0)) r3 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r3) r4 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r4) request_key(&(0x7f00000005c0)='blacklist\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)='@proc\\posix_acl_access:\x00', r4) r5 = add_key$user(&(0x7f0000000300)='\xde\xadE\x84\x00', &(0x7f0000000340)={'qyz', 0x3}, &(0x7f0000000480)="c8b9724687805506d343c517e061e5a61f51839016afb2e020cadd985e65a6c37c128aa0d2f580fbe17631acb8cf467272663039e3cadbed2e805b26c45c942a6658bd91f896553fc0bb57c1bfd3d273afb870a2d1222873ad1d446ed7571cfd42b5376f6f97b378d22a693e6d88e70bbdbf176d153118cbab7ef60aa7e5d5e35b1a8876fe1060ed9aac7f99906320c9f3dba044384bb30f861729e5cd3f5570eff9d903ccab35b4197143a31e8179733b3720da50d4475e047384e64879a0a0a2d9b5092db5fda99d43d1d7855e45d377cde206fb085533aa84", 0xda, 0xfffffffffffffffc) r6 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r6) keyctl$search(0xa, r5, &(0x7f0000000380)='big_key\x00', &(0x7f0000000580)={'syz', 0x3}, r6) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x11, 0xc, "2554baec09a3133b27be67790f9533f122b64c8eaa4c521791a96a2f63e645012a2c61fc3fff06f4fed36b379e8be28dce4f5551f88e656ded81cdd931de10b6", "60ffe458214269ee21b73bde33ff7dcf87ec96f78ff13046bd95588151857891", [0x6, 0x2]}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r0, 0x3a, 0x47}, &(0x7f00000000c0)=ANY=[@ANYBLOB="656e633d706b63733120686173683d78636263286361737436d800"/79], &(0x7f0000000140)="ed09b25a3d43547626e78c00842febbfb103bbec23f9e7be443a17a3a4bfb8d4a945e2c836a32cf70c25d1885b8b076b145dba4b0dc0b72e92d6", &(0x7f0000000180)=""/71) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x19, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x20000001, 0x99, &(0x7f000000d000)=""/153, 0x40f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe6b, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10}, 0x41) 13:34:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="1b0000000600000000000000ab151b6f23fa70ec0ef0212e4afeb1d958aea8e20f2402dc17d97f02ead4d107cedfd0da70870f713eda748c9a0dd41ad9b46c2554bac3394f7503805ff42026fe06b3432bb989350d0891b37defc7bedb8aeec7fc95d94a5a8d429d53be237c9c8ade7ff4e4ec1077fd0dd006ae7b24b5a1f4d5772dd50d5270029f011ce595474bf5d1105be1c9aab2ba71d82c911e5198a6eb08fe9103acfc0ad50b06896b0429500f49ffbda7c91cdd721996d5e37c97e02c2dc5d3e5c27e5a516b8c75f30a60c78fdf6ac9f06089f577cc0c055f0c5c67c55d2022c2375b98"]}) 13:34:56 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) socketpair(0xa, 0x2, 0x4b, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40020884}, 0x2000) 13:34:56 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) r0 = memfd_create(&(0x7f0000000240)='%selinuxnodevmd5sum\'\x00', 0x0) fadvise64(r0, 0x55fd, 0x5, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xb17f8ed21db70ecd, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r1, &(0x7f0000000200)=""/39, 0x27, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r2, &(0x7f0000000200)=""/39, 0x27, 0x0) close(0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fbafffffffffffffff1000e8788", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x3}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fbafffffffffffffff1000e8788", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fbafffffffffffffff1000e8788", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) keyctl$chown(0x4, 0x0, 0x0, 0x0) getuid() 13:34:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:56 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x68, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x7) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl(r2, 0x3, &(0x7f0000001a80)="ff5710385c0e2fb1702ae93ff2289239b39164134b7d8d725fd2063ea374185ef11d34aac842c204850e7832d0bd46fcfadbd5d5dd7708fc0743ab0647fbcc2e3a23532070c68b540fffb0caa36203e9909763e39c518bc0ad9ea888f8cfe5a35e71db404d9f3230e74b741e0b2f5349917ce2c42255816e3811d4ad47956c935ddce26603649f2202658f97bfb05c089fc06e0048a7c8b03fa1c648645bc38b65e75f24d8b7e7f9bd8124d4f002b665e574ba942980ab7dfbf53ec81cb1d102d6e9078ad596d6937fe26a9523129c22644577a2162fa1da26a10469fc446746") fallocate(r3, 0x0, 0x0, 0x1000f4) readv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000041c0)=ANY=[@ANYBLOB='n'], 0x1) ftruncate(r2, 0x8200) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r3, 0x0) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000240)=0x6) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000011c0)) sendmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{&(0x7f0000000440)=@pppoe={0x18, 0x0, {0x3, @random="b36772ba803b", 'gre0\x00'}}, 0x80, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2df}}, {{0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000002440)="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", 0x7ff}, {&(0x7f0000002000)="7eea421ed53761db717e468604d03c95402431e48d69e72bae56a32dbe57d0a9a1ced4520bc36cd65343c0d7ad2bc9d00894da98242bf5efac4bf93c7c9c98d849c8b7280abd91df56e9adc0c3ae93461c680de881db74e009c89f47cf2ffd11445e030a9946991422e0b8af0f6d3e429b669075347dddf35b09584013553f1254bf17753615b887f7eb2d3632c6c4a861742044c51d735046dd67000ff4433aacf5e49011cedcc318bc1e50d391672481048284ae0b191fe158295d85df", 0xbe}, {0x0}], 0x3, &(0x7f0000003440)=[{0xf8, 0x1fb, 0x4, "715e26c3bc6ba46889463d3a65f5c87ccfeb6b68b2ea519cf84dcd87d7a0bbd9ba9190df454c3436f83b8768c603a1f931b06d6a2adeef5efbfdb0158033357f14815e73cde7ba6873f5c133a98cfbc7e99e9f9930b3a0734719f4574bd9977b2eea66389aff7d09a3bb82e4f63b0c27dc7adef88199bd6f29b55191820237f465895cfdef6162b9f81ec34b5172a858110906233494a20a21086b948f433715dc644aefff7786a5d4219c88930bd61b3818014b54fe5fa2952a88558201ceb3de29110a3ac6a8602dfba78b063fdd01a9f4939503759efedadd6df408d39fe6fca1c12a0c96189c"}, {0x38, 0x108, 0x0, "404c3875d439110e4895117296554de34270691d68c60b2d417be0b92a3f4208c79291beaf2b"}, {0x80, 0x1, 0x0, "c7ed3d79d2d1dc3775536adaa7fd743ff38a1ade5273c465a7c4f78ad238c6703970debadd207a05af1192a2d2d0f253af0c09e413613c0a3428e03affc028d4f0250c4f61a419abd06dfcbbf8b274b41f5c4379cf23723eeda0223f6ca2de838d9c05976eea0246e8a9c308f3d3f2"}, {0x10, 0x10a, 0x4c}, {0x10, 0x1dd, 0x3f80000}], 0x1d0}}, {{0x0, 0x0, &(0x7f0000004940)=[{&(0x7f0000001b80)}, {&(0x7f0000002340)}, {&(0x7f0000004880)="612123082f1690b13b47ff2132fcc215d54e4532b014627c7c2a9c390ea832955e0cd84d890c20d8102349f6bb034a01309cd89334285fa67f0d02feb1cac57bd50df4f3f6f40977f4ada0bd2c0941ff24e4ac0a2fd9e1cca9b1f45a0ec01717afc82f2a2462fe0c1ae6031ed0b9a3ec6aa8caf9f9c6ce4d7ac623d512182785a7e86d6a955ef3e02082b695358220cf1fe9b4601f2bfd84729e0bcfe26678cbf0d3e704b0fec46459b534cea34339f48f417249", 0xb4}], 0x3, &(0x7f00000049c0)=[{0x108, 0x118, 0x1b8, "8bc39aef3b46e633f979ded8a7269fbb1f39bf6c4a2e6fb60236bb818c99706af5937fc91ba82b733517369e1ee9d2cf042e0d267299c51babbaaca5a627f1ca9391bb25357fb8c239575b07adcf98c47a22a8ab5c217bc734f3fc8e3920821cf35a76e87610a43a15d3c7cc99018c0711368b9debd1afde2045e8d4a2717939c9c72a43ed6ef2943b05ceb176c5280aae960442d4c02f9f3ba71565e9923edc8c9e29529a0671ef73ca4334f5a091c51e0de6f88dfa7bf4b1655cecef8559a6ad869288090e4207e3f2e0ad1818a4c56e336aac462950d78a02ec5dca7ceee67c4a5917972ef9cdc191d308bef755aafb"}], 0x108}}], 0x3, 0x4021000) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) r6 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r6, 0x0, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x36, &(0x7f0000000300)=ANY=[], 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001900), 0x0, 0x729aa39ff2309a7a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000d80)="43eabc59", 0x4) 13:34:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:56 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x3ff, 0x6, 0xe1b2, 0x1f}, 0xffffff31) 13:34:56 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$ipvs(0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/35, 0x23) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) signalfd(r2, &(0x7f00000000c0)={0x7}, 0x8) 13:34:56 executing program 3: getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="020700090200000000008000bd5a00000003472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed860e6cb504000000ca8fcb69057d000000000000c1374611e4f88cffb9130c2ae59eedc2678bf46dfe6204c19e642a17b9e865ae93e6803af7ff0c95a642676e5ae80549eb77819441eefafc11b8"], 0x7d}}, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {0x9f2}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local}}, 0xe8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480)=0xfffeffff, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="4b9f3cf07277a5abd37cb073f86d9e0fdd308245aad9a8cf77ff42e4bdd12e208b98be", @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYBLOB="e036d74b9e5a74f74e9012526bf16f557ccc3195"], @ANYRES32=r2, @ANYRESHEX, @ANYRESOCT], &(0x7f00000004c0)='./file0\x00', 0x0, 0x208e034, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f00007630260300e29507449a40cd620bc9aa172172284b71d3ef16e64fdab434a3591fe955c0446cd51f4500"/55], &(0x7f00000002c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) fcntl$setlease(0xffffffffffffffff, 0x400, 0x3) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000080)="36b2e420652524d438354a609401cc72a0413e0cb2523a", 0x17) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000600)={0x7fffffff, {{0xa, 0x0, 0x5, @mcast2, 0x7}}, 0x0, 0x1, [{{0xa, 0x4e22, 0x80, @mcast1, 0x75}}]}, 0x110) syz_open_procfs(0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000040)=""/24, &(0x7f0000000080)=0x18) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) 13:34:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f00000001c0)="45e44d0214058477e60fad1b4b3d89f9721b91b9b4be37094704d2f67e7cde8595b354b20f") write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000036) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) syz_open_procfs(r2, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x4c802, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000240)={'caif0\x00'}) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) [ 1047.685748] EXT4-fs (sda1): re-mounted. Opts: (null) 13:34:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:57 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECUREBITS(0x1b) r0 = memfd_create(&(0x7f0000000240)='%selinuxnodevmd5sum\'\x00', 0x0) fadvise64(r0, 0x55fd, 0x5, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0xb17f8ed21db70ecd, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r1, &(0x7f0000000200)=""/39, 0x27, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r2, &(0x7f0000000200)=""/39, 0x27, 0x0) close(0xffffffffffffffff) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fbafffffffffffffff1000e8788", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x3}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fbafffffffffffffff1000e8788", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fbafffffffffffffff1000e8788", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) keyctl$chown(0x4, 0x0, 0x0, 0x0) getuid() 13:34:57 executing program 2: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000200)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="04d99246257b144c8f4cffa9a6231e3c5db478c91243926a6cd99c4c689bf489cd8dd705e116fb226cd16677b60b72c7d2ea8e55d0958e36935d0307721c2784de91a8dcecd9a0fa4190130f19d7e9a1793ea1260d8d7084b160071d9c36564628f214b4d688eca10d63f14514da8a"]}}, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xfffffffffffffc83) fallocate(0xffffffffffffffff, 0x0, 0x0, 0xf02) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000280)="27335a60cca87662f1137a57400534e2700b58e70bb7a26b5996faa9351cb2677bafd79f8bdb4fd6d368d72234e65d862a", 0x31, 0x20000801, &(0x7f0000000300)={0xa, 0x4e21, 0x80, @mcast1, 0x4}, 0x1c) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [], r3}, 0x18, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="04000816ccfb2e6860dc81203e5b012ab82755a36ef422d635d6f630625c21fd6c2eed8d1521ddbbbb3ea269482354a3ef24fe5668243374e346b55d622543b6dd46b34cd27ca1ecae873e68514a8135809cbb50b9b8e7bd6cb8da9474e6d4a15a746424fdb28dd2b707a80e7450c3b9568fe762a845dd1050a000"/133], 0x5, 0x0) 13:34:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x40000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) quotactl(0x9, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000003c0)="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") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) ppoll(&(0x7f0000000080)=[{r1, 0x274}, {r2, 0x100}, {r0, 0x20}, {r3, 0x100}], 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100)={0x7}, 0x8) 13:34:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:57 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:58 executing program 2: syz_open_dev$char_usb(0xc, 0xb4, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xa4e, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5500000018007f4500fe01b2a4a280930a06000000a84599910000002900090008002600010000001900150006000000000067c01338d54400009ba1136ef75a9251b77226483113e92f13e70b9cfb83de44b2ee3b", 0x55}], 0x1}, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000340)={'nat\x00', 0x0, 0x4, 0xb5, [], 0xa, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/181}, &(0x7f00000003c0)=0x78) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="10000000000000230100000001000000"], 0x10}, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 13:34:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x4000, 0x16) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r2) sendmsg$unix(r2, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) renameat(r1, &(0x7f0000000680)='./file0\x00', r2, &(0x7f00000006c0)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000036) syz_open_procfs(r3, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x2, &(0x7f0000000340)=[{&(0x7f00000002c0)="23c4e4cde4a572068dde425b804249655ad68ebbdab6c15013c1b4b9cd7a2d4b7a27d7ce12e665f5273e4f6f6e8b3f545b6a472702f43a25692058798ed92b4061b5d85844588645dc4f4be19192905e7ec3a04a3a09d73ed469681abd778b1127eacafd4ae2ca74784ae81c4b3799776a", 0x71, 0xc31}, {&(0x7f0000000480)="a7556789339bcc2d5348e605e8dd66179534468ebfc671e1083993751615643716070e7515ad997da3d6ff1aacd5216734e7254bb725f6244572a2f3da0537563bcf2eefed1500c6703922c2db202c89d4451b7bfaa4c51b41f81b7a840efa9ce4ead405b426f8124f70058d2c206c74f2744619f34524b69ff124e1f456aa29aa76b231a7b2658973e9d3160cd0a64d7c0178f4155f435bdc93ea1e56422e4afaf5a0a80859fc425c4ba6c10d7afa6b4644f54df84e5ba2c757c34c0331e50a18797783318e2e", 0xc7, 0x1}], 0x101040, &(0x7f0000000580)={[{@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}, {@fsname={'fsname', 0x3d, '\''}}, {@seclabel='seclabel'}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@subj_type={'subj_type', 0x3d, '/\xe1\xffproc^vmnet0&(:'}}, {@subj_role={'subj_role', 0x3d, '*'}}, {@obj_role={'obj_role', 0x3d, 'GPL'}}]}) 13:34:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)={0x0, 0x0, 0x0, 0x0, 0x2}) write(r0, &(0x7f000054bfba)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) syz_open_pts(r0, 0x2) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) pidfd_send_signal(r1, 0x3f, &(0x7f00000000c0)={0xe, 0x5, 0x8}, 0x0) r2 = dup(0xffffffffffffffff) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x1, 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)) write$selinux_attr(r2, 0x0, 0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r4) sendmsg$unix(r4, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000080)) [ 1048.966686] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.2'. 13:34:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1049.044577] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.2'. 13:34:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1049.122152] IPv6: IPV6: multipath route replace failed (check consistency of installed routes): :: nexthop :: ifi 1 13:34:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/124}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x10) r1 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) [ 1049.171701] IPv6: IPV6: multipath route replace failed (check consistency of installed routes): :: nexthop :: ifi 6 13:34:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat(r0, &(0x7f0000000240)='./file0\x00', 0x200, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:59 executing program 2: socket$packet(0x11, 0x2, 0x300) sched_setaffinity(0x0, 0xfffffffffffffd36, &(0x7f00000001c0)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'tunl0\x00', 0x4fff}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYBLOB="28000000106f78cb5e000000dcbe2dfc0f7e17fef26a4b9c9a3f7f751b6e8faaa993d55ceac6f8a8efdde3d282d6465f21ad9af407e6098d36b5339af2a2447c53628752a22230773da1e2fc47e13d7aa7948bfdb30b6e27c89e3785df33fae951022801b26ea2a57cdb933b9e47f940ec3c4e726117e345de54dd4a7439e6d76af2555e345361e7c4f1639383a5ab37", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xd0) ftruncate(r3, 0x2007fff) sendfile(r0, r3, 0x0, 0x800000000024) creat(0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x8, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x80) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) writev(r5, &(0x7f00000003c0), 0x63) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r4) ioctl$UI_GET_SYSNAME(r5, 0x8040552c, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x81207be49fc734d5}, 0xc, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000029bd7000fbdbdf25010400000000000002000000000000000664703a73797a32000000009c1cdbdff28cd71a1340c16b6901d454b814698c8b96d4d31fb6a6d65de9387308df45a73757abd502a0529aa154c014074a"], 0x2c}}, 0x8001) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 13:34:59 executing program 3: fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=@known='system.sockprotoname\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0xffffffffffffff62}, 0x810) r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r3) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000380)={0x1298097fa96c52dc, @multicast2, 0x4e20, 0x0, 'wrr\x00', 0x10, 0x0, 0x7f}, 0x2c) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000140)=""/22) fcntl$setstatus(r1, 0x4, 0x41400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x800) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000240)=""/219) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000080)={r4, 0x0, 0x0, 0x8, 0xfffffffffffffff7}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000340)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r6, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) dup(r4) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) ioctl$TIOCMIWAIT(r5, 0x545c, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 13:34:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:34:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x19, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3, 0x0, 0xfffffffe}, 0x10}, 0x70) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r2 = dup2(r1, r0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000040)) 13:34:59 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/wireless\x00') mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x8004, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) flock(0xffffffffffffffff, 0x0) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) dup(0xffffffffffffffff) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x800000003, 0xff) dup(r4) sendfile(0xffffffffffffffff, r3, 0x0, 0x8000fffffffe) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x10010000000036) wait4(r7, &(0x7f0000000040), 0x2, &(0x7f0000000280)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0xffffffffffffffff, r6, 0x0) listen(r2, 0x2) sendto$inet6(r1, &(0x7f0000000100)="b4", 0xfffffe46, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) shutdown(r2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) 13:34:59 executing program 1: ptrace$setopts(0x4206, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) shutdown(r0, 0x1) [ 1050.435644] selinux_nlmsg_perm: 20 callbacks suppressed [ 1050.435655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28432 sclass=netlink_route_socket pig=16828 comm=syz-executor.2 13:34:59 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) write$selinux_validatetrans(r1, &(0x7f00000002c0)={'system_u:object_r:hald_exec_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x4, 0x20, '/usr/sbin/ntpd\x00'}, 0x54) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:34:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000000)={0x7, 'veth0\x00', 0x1}, 0x18) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) 13:34:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r0) r1 = add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="81be4e0794613a20bf36bc6805f39f8dcf39584a612c5e28232164a4e57799bede459887e584f149c199c61559df0fb047a72fbffcd4f0dde1141a35d5dc8f62ec21351ca06c746f185ab18a5b66cba984ec77b475c8215444b478a328531961f739b8f43e9e1abfb5a9ed2a620bd035a4d0f70554fa838edec2ccd01c3c7e", 0x7f, r0) keyctl$get_security(0x11, r1, &(0x7f00000003c0)=""/4096, 0x1000) 13:35:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000240)=0xc) ptrace$getregs(0xc, r1, 0x2, &(0x7f00000002c0)=""/34) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x80, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x9, 0x7, 0x0, "fda3f3c50988adb51fc16cdfcdd367e223880c055d91450cbdfbd64439395ac3d1a0029439d82e667276f761e012133dbaf61562a43c23c9f3e3df3446f6f487", "66271987d14d9b22f72e775f7e6d3ee686cd58839f425213572f1618860508dded35a2729daede79ac52781e64c936bef9738ff61defabe49c7589e6816ce5fa", "7642efd5ed7c308d3099cd1510af860a8eb8915b4c8e95718468043ae9e3d6e4", [0x0, 0x4]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x2, &(0x7f00000002c0)=ANY=[@ANYRESOCT], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0xa5, &(0x7f0000000140)=""/165, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x3}, 0x10}, 0x70) 13:35:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x3}, 0x960, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) fallocate(r0, 0x11, 0x0, 0x9000000) 13:35:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x101102, 0x68) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x14004a006}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@bridge_dellink={0x70, 0x11, 0x100, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x0, 0x0, 0x20, 0x32702}, [@IFLA_BROADCAST={0xc, 0x2, @broadcast}, @IFLA_PORT_SELF={0x14, 0x19, [@IFLA_PORT_VF={0x8}, @IFLA_PORT_VF={0x8, 0x1, 0x8}]}, @IFLA_BROADCAST={0xc, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xae219bda319333b5}}, @IFLA_MAP={0x24, 0xe, {0x9, 0x40, 0x9, 0x1, 0x5, 0x5}}]}, 0x70}, 0x1, 0x0, 0x0, 0x2000}, 0x20040000) 13:35:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:00 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r2) sendmsg$unix(r2, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000180)=0x100004) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affe04c06cf28a2e6ca03461247e2c47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f00000000c0)=""/155, 0x0, 0x0, [], r1, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffc4c, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffd}}, 0x3e) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r4) sendmsg$unix(r4, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$KDMKTONE(r4, 0x4b30, 0xfffffffffffffffc) close(r3) sendmsg$unix(r3, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r3, &(0x7f00000001c0)="36197abd8801df86106a4a14a1eb594c35cbc2229bc4cb821f15c28dc9", &(0x7f0000000200)=""/39, 0x4}, 0x20) 13:35:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ae53bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) 13:35:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000010000108000000000000000009000000", @ANYRES32=0x0, @ANYBLOB="000000000000000004001a0008001b0000000000"], 0x2c}}, 0x0) 13:35:00 executing program 3: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) get_thread_area(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000022}, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x88, r1, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xe9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x41b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6dd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffa}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x8011}, 0x10) 13:35:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:01 executing program 4: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000001c0)={'ip6erspan0\x00', 0x400}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r1) keyctl$set_timeout(0xf, r1, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:01 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) setns(r0, 0x20000000) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa2040211}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x24, r2, 0x10, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x9}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001, 0x4}, 0x2c) 13:35:01 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280), 0x1c) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) dup(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x3, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000001b, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x2, 0x0) dup2(r2, r3) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000000000002ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd21affe2009efdc31a38158703000000000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c4ae9db868d4ee3bc0b06f8865611d9e5a0a652c1a8cf8d285e1629b0e097e78390c268b4919ba00c2f81d8ebc88648339483572c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r4, r4, &(0x7f0000000200), 0xa198) openat$ptmx(0xffffffffffffff9c, 0x0, 0x240801, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 13:35:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:01 executing program 2: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="240000003a00d17da53a7436fef7001d0a0b49ffed000009000028000800030001000000", 0x24) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]}, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) setresuid(r2, r4, r6) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') accept4$packet(r7, 0x0, &(0x7f0000000000), 0x80000) 13:35:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) socket$inet6(0xa, 0x0, 0x100000001) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x47, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000340)='\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@mcast2, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local, 0x0, 0x3}}, 0xe8) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000500), 0x4) getresuid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001700)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x66ec9c89245861ae, &(0x7f0000001740)=0xdd77, 0x4) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000001c0)={0x11, 0x21, 0x10, 0x1a, 0x9, 0x61d31e25, 0x1, 0x136, 0x1}) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x68) r4 = creat(0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0xfd, r5, 0x100, 0x70bd29, 0x25dfdbfe}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8800) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x7c, r5, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9f}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x30}}, 0x0) 13:35:01 executing program 5: pause() bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x19, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153, 0x1e00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') accept4$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000580)=0x14, 0xe15811c48e72d8dd) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000005c0)={'vcan0\x00', r6}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r8 = dup(r3) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r13, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r13, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r13}]]}}}]}, 0x38}}, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r17, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000012c0)=ANY=[@ANYBLOB="380006000042111130534f7f0525bb97476ac63e4abd7d842d050e4d2b1f02987e9f3d4584c4", @ANYRES32=r17, @ANYBLOB="03000000000000001800120008000100767469000c00020008000100", @ANYRES32=r17], 0x38}}, 0x0) accept(0xffffffffffffffff, &(0x7f00000008c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x80) socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0xd2e53963fd2c7ce4) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r21, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) r22 = socket$nl_route(0x10, 0x3, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r25, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r22, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r25, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r25}]]}}}]}, 0x38}}, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$netlink(0x10, 0x3, 0x0) r28 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r28, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r28, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r27, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r29, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r26, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r29, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r29}]]}}}]}, 0x38}}, 0x0) r30 = socket$nl_route(0x10, 0x3, 0x0) r31 = socket$netlink(0x10, 0x3, 0x0) r32 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r32, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r32, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r31, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r33, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r30, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r33, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r33}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000a40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r8, &(0x7f0000001280)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000800}, 0xc, &(0x7f0000001240)={&(0x7f0000000a80)={0x798, r9, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{0x8, 0x1, r13}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x17}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x13c, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r17}, {0x1bc, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xd01}}, {0x8, 0x6, r6}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x400, 0x2, 0x1, 0x54}, {0x23e, 0x3d, 0x5, 0x9}, {0x40, 0xff, 0xc1, 0x9}, {0x40, 0xa5, 0x1f, 0x7}, {0x9, 0x40, 0x8a, 0x401}, {0x6, 0x3, 0xff, 0x2}, {0x1, 0xff, 0x6, 0x80000000}, {0xb, 0xf, 0x3, 0x3}, {0x7ff, 0x1, 0xff, 0x5}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xf344}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r21}, {0x1ac, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r25}, {0x204, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x0, 0x7, 0x20, 0x88}, {0x180, 0x40, 0x9, 0x7fff}, {0x1, 0x3, 0x0, 0x1}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r29}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r34}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}]}, 0x798}, 0x1, 0x0, 0x0, 0x4000040}, 0x4080800) r35 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2200032}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x14, r35, 0x100, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4c014) sendmsg$NET_DM_CMD_START(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100030100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r35, 0x8, 0x70bd2a, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}}, 0x800) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$TIOCCBRK(r1, 0x5428) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r36, &(0x7f0000d7cfcb), 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x2) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e24, @multicast1}, {0x2, 0xfff, @rand_addr=0x7}, {0x2, 0x4e21, @remote}, 0x2, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)='ipddp0\x00', 0x3, 0x0, 0x50b}) 13:35:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "9f49ec589f3bda11914e06370938ea16"}, 0x11, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000000), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local, 0x0, 0x0, 0x1}}, 0xe8) listen(r3, 0x95f) pipe(&(0x7f00000001c0)) syslog(0x0, &(0x7f00000002c0)=""/175, 0xaf) io_submit(0x0, 0x1, &(0x7f0000000900)=[0x0]) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') sendfile(r4, r5, 0x0, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) 13:35:02 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x0, &(0x7f0000000280), 0x1c) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) dup(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x3, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000001b, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x2, 0x0) dup2(r2, r3) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000000000002ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd21affe2009efdc31a38158703000000000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c4ae9db868d4ee3bc0b06f8865611d9e5a0a652c1a8cf8d285e1629b0e097e78390c268b4919ba00c2f81d8ebc88648339483572c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r4, r4, &(0x7f0000000200), 0xa198) openat$ptmx(0xffffffffffffff9c, 0x0, 0x240801, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 13:35:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1053.175638] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16896 sclass=netlink_route_socket pig=17028 comm=syz-executor.5 13:35:02 executing program 2: clone(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="a0de925b34dcb7c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3009f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d1239bf00644868dd927f34ca15bb4c70f5c4677f30ed8c8d8c7513f1209217d2ac1c60455a77c9545f12a29c882cc2fb5eef125c03e7137b74cc") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x8, 0x0, 0x4}, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x7e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_]Sm\x98:#\"\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04m\x89\x0e4\xe6\x1d]\xb3\xd9iO=\r=\x92\x89\x16~\xf4\xf7\xf9\x00\x00\x00\x00\xe1\xff\xff\xff\xff\xff\xff\x01') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x800000000000000, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e21, 0x1fd, @empty, 0x400}, 0x1c) r5 = memfd_create(&(0x7f0000003380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b0x0) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000140)={0x2, 0xfffffffffffffdb2, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, r2, 0x1, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) r5 = add_key$user(0x0, 0x0, &(0x7f0000000740), 0x0, 0xfffffffffffffffb) keyctl$chown(0x4, r5, 0x0, 0x0) clone(0x70024103, 0x0, 0x0, 0x0, 0x0) 13:35:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x19, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f000000d000)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r1) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f00000005c0)) r2 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="7fbf888034b08488a7a3f69b5ebb0f688952ba8c690ee0ef07cba503dd6913d54321130f08338e85620a28fd6d819937390f4261aab66cb008a992f6e6c4a0a1c80f03a8e3f36e8d3ddd55e342fd3d57d826894b3554638ae962bb84cdff533ec8fc079dd16689e5f9fd320c6b66c9d863d8afdb00fb106c7b18a12cc1dc3cfbb0", 0x81, r1) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000580)=0xffff3eb8, 0x4) keyctl$read(0xb, r2, &(0x7f0000000500)=""/125, 0x7d) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'bcsf0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}) socketpair(0x2, 0x5, 0xff, &(0x7f0000000040)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f00000003c0)=0x3eb) 13:35:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) recvmmsg(r0, &(0x7f0000005640)=[{{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/195, 0xc3}, {&(0x7f0000001740)=""/130, 0x82}, {&(0x7f0000001800)=""/64, 0x40}, {&(0x7f0000001840)=""/133, 0x85}], 0x5, &(0x7f0000001980)=""/155, 0x9b}, 0x6}, {{&(0x7f0000001a40)=@isdn, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001ac0)=""/106, 0x6a}, {&(0x7f0000001b40)=""/195, 0xc3}, {&(0x7f0000001c40)=""/10, 0xa}, {&(0x7f0000001c80)=""/241, 0xf1}, {&(0x7f0000001d80)=""/32, 0x20}, {&(0x7f0000001dc0)=""/26, 0x1a}], 0x6, &(0x7f0000001e80)=""/241, 0xf1}, 0x3}, {{&(0x7f0000001f80)=@l2, 0x80, &(0x7f0000002200)=[{&(0x7f0000002000)=""/200, 0xc8}, {&(0x7f0000002100)=""/253, 0xfd}], 0x2, &(0x7f0000002240)=""/187, 0xbb}, 0xfa}, {{&(0x7f0000002300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002380)=""/85, 0x55}, {&(0x7f0000002400)=""/21, 0x15}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/25, 0x19}], 0x4, &(0x7f0000002580)=""/191, 0xbf}, 0x4}, {{&(0x7f0000002640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002a00)=[{&(0x7f00000026c0)=""/124, 0x7c}, {&(0x7f0000002740)=""/176, 0xb0}, {&(0x7f0000002800)=""/234, 0xea}, {&(0x7f0000002900)=""/227, 0xe3}], 0x4}, 0x388b4723}, {{&(0x7f0000002a40)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002ac0)=""/85, 0x55}, {&(0x7f0000002b40)=""/226, 0xe2}], 0x2, &(0x7f0000002c80)}, 0x6}, {{&(0x7f0000002cc0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000002d40)=""/238, 0xee}, {&(0x7f0000002e40)=""/4096, 0x1000}, {&(0x7f0000003e40)=""/172, 0xac}], 0x3, &(0x7f0000003f40)=""/190, 0xbe}, 0x8}, {{0x0, 0x0, &(0x7f0000005480)=[{&(0x7f0000004000)=""/19, 0x13}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/68, 0x44}, {&(0x7f00000050c0)=""/204, 0xcc}, {&(0x7f00000051c0)=""/156, 0x9c}, {&(0x7f0000005280)=""/35, 0x23}, {&(0x7f00000052c0)=""/45, 0x2d}, {&(0x7f0000005300)=""/54, 0x36}, {&(0x7f0000005340)=""/80, 0x50}, {&(0x7f00000053c0)=""/157, 0x9d}], 0xa, &(0x7f0000005540)=""/237, 0xed}, 0xffff220d}], 0x8, 0x2000, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r1}, {0x0, 0x9, 0x0, 0x0, 0x8}, {}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in6=@rand_addr="15b8ecce5b7bf1cbc6a3d957b7cc4119"}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) mount(&(0x7f00000001c0)=@sg0='/dev/sg0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='fusectl\x00', 0x208008, &(0x7f0000000300)='ramfs\x00') pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x19, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b222f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be039212273600"/202], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0xa0, &(0x7f0000000040)=""/160, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xffffbfff}, 0x10}, 0x70) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000180)={@rand_addr, 0x0}, &(0x7f00000001c0)=0x14) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0xffffffff, 0x7, 0x200, 0x100, 0xffffffffffffffff, 0x101, [], r2, r3, 0x1, 0x2}, 0x3c) setsockopt$inet_int(r0, 0x0, 0x18, &(0x7f0000000140)=0xff, 0x4) 13:35:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1b7a7) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000001c0)={0x87b, 0x7, 0x5a, 0x1f, 0x3}) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:04 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x1a, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0xff}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@remote}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) r1 = syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x464) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:04 executing program 1: clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x44002, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x88) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYBLOB="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"], 0x0, 0xba}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x42080, 0x0) ioctl$VT_GETSTATE(r5, 0x5603, &(0x7f0000000300)={0x5, 0xc7c6}) ptrace$cont(0x7, r0, 0x0, 0x0) 13:35:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)=@known='com.apple.system.Security\x00', &(0x7f0000000480)='userproc(#\xc8%%wlan0^*}-!ppp1{vboxnet1-ppp0\x00', 0x2a, 0x6e3a289d6040b0ab) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r2 = accept(r1, &(0x7f00000003c0)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000000240)=0x80) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000440)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) close(r3) sendmsg$unix(r3, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1000000000000000daa95bc951e87c69540989510100000001000000"], 0x10}, 0x0) write$P9_RREMOVE(r3, &(0x7f00000000c0)={0x7, 0x7b, 0x1}, 0x7) 13:35:04 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xff, 0x7, 0x0, "813d9fc2a65a452ecbfa41334f06256a", "ce1758046a3268727d54aa7f07691563233a69e032af47af9a7f9c74ae121d5eca57823dae37a76fca5d1b92b03c465f6b812e07399e6b81e449c2a730e31a307672d03f376411f7e0527d04c3cf7ba6de5ab39cf6efac4da2c610eb0a202197089cd6ac149d3af7f8b239433508d646ddea91a6bbc822ef0e14d7254bc3454699745135910eed929cd4c55654ab6100215fcfce41381fdcc8136e1e7509a6365a70b88f7728c926a1b0262cf0db40f2f7288c3926907e7d3100fde14eaac9339f5f29e1c9af9abb9d3b211c1116571a4a958b9988a9905143cdccde7153064bce794356da0f53abb650"}, 0xff, 0x1) dup2(r2, r0) 13:35:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) tee(r3, r4, 0xfffffffffffffffb, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x1, &(0x7f0000000000)=[{0x4000006}]}) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x7, 0x2) close(r5) sendmsg$unix(r5, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="11000000000000000100000001000000bde6fd670550b95e5228025949d03f9e0d79a0ea35f81bb7ba218e"], 0x10}, 0x0) ioctl$RTC_UIE_OFF(r5, 0x7004) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 13:35:05 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x140) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'bcsh0\x00', 0x3}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffb, 0x4) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000180)=0x4a2) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0xffffffffffffffc9) listen(0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0x3, 0x1000000020000002, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r1, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80, 0x80000) r2 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 13:35:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000040)='./bus\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000300)='./bus\x00', 0x100, 0x2, &(0x7f0000000340)=[{&(0x7f0000000600)="407ebfd09cb4051038e97b5ac14c2010809ea8aeec3e63d1d6838f7f3694d61932350757ed072bde62e0b5305a8738bb9d89fe3a078ee7e05115659e4514de1049f8acca14b16236e0689b2e3c965aa7e2cc85bd032ab9d1e11f1a49001a9c884eeb4a3789350e46d2f9c85c945b26382a6d5a11f179b491ec928f99a46cec8c5cd9f06f8ba7feb6880ceab7be5f1538789de798bde5beae3b9cead16dbca50064746ef70232455101cef43a9e8e23c46b2a7fe115336c438f0ad030f34b4a7be96dc785dd8bcc67c4dd55e75877553b9a1778809edcb29b", 0xd8, 0x2}, {&(0x7f00000004c0)="d27d04c55b9cc38599d2634234b369d945496ab4120099375c21300d7ecb11d34344862980fef291569a006db4fea505d06d58712dfd9715d202fce51a13009f2b44000a25856beacf4ab04cdeb32db4b50b4e666d9ce63bc53775533bbeb56d91a36f6c30f79f0838ff54a8a277b2b09e", 0x71, 0x8}], 0x2010040, &(0x7f0000000700)={[{@commit={'commit', 0x3d, 0x2d}}, {@test_dummy_encryption='test_dummy_encryption'}, {@usrjquota='usrjquota='}, {@grpid='grpid'}, {@grpjquota='grpjquota='}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@noload='noload'}, {@noload='noload'}, {@noblock_validity='noblock_validity'}, {@oldalloc='oldalloc'}], [{@measure='measure'}, {@obj_user={'obj_user', 0x3d, 'bdev\x94cpuseteth0bdev]$posix_acl_access\'vmnet1'}}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x4c982, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpeername$unix(r0, &(0x7f0000000180), &(0x7f0000000280)=0x6e) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x8180d) socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000000000011, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast2}, 0x1a) r3 = socket$inet6(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000280), 0x3) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r1, 0x4c01) bind$unix(r4, &(0x7f0000000580)=@file={0x0, './bus\x00'}, 0x6e) ioctl$int_out(r1, 0x5461, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x4000000000000004) socket$packet(0x11, 0x0, 0x300) 13:35:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCCBRK(r1, 0x5428) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000001c0)={r0, 0x0, 0x10000, 0x2, 0x3ff}) syz_open_procfs(0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r2) sendmsg$unix(r2, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x4) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:05 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x140) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'bcsh0\x00', 0x3}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffb, 0x4) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000180)=0x4a2) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0xffffffffffffffc9) listen(0xffffffffffffffff, 0x0) sendto$inet(r1, 0x0, 0x3, 0x1000000020000002, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(r1, &(0x7f0000000200)=@can, &(0x7f0000000280)=0x80, 0x80000) r2 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 1056.269505] print_req_error: 1 callbacks suppressed [ 1056.269512] print_req_error: I/O error, dev loop0, sector 0 [ 1056.282007] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 1056.289978] print_req_error: I/O error, dev loop0, sector 8 [ 1056.300102] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 1056.309049] print_req_error: I/O error, dev loop0, sector 16 [ 1056.315882] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 1056.324274] print_req_error: I/O error, dev loop0, sector 24 [ 1056.330337] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 1056.338737] print_req_error: I/O error, dev loop0, sector 32 [ 1056.352643] Buffer I/O error on dev loop0, logical block 4, lost async page write 13:35:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x1ee6b, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x140) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1056.610763] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1056.801490] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1056.834818] print_req_error: I/O error, dev loop0, sector 0 13:35:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000040)='./bus\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000200)='ext3\x00', &(0x7f0000000300)='./bus\x00', 0x100, 0x2, &(0x7f0000000340)=[{&(0x7f0000000600)="407ebfd09cb4051038e97b5ac14c2010809ea8aeec3e63d1d6838f7f3694d61932350757ed072bde62e0b5305a8738bb9d89fe3a078ee7e05115659e4514de1049f8acca14b16236e0689b2e3c965aa7e2cc85bd032ab9d1e11f1a49001a9c884eeb4a3789350e46d2f9c85c945b26382a6d5a11f179b491ec928f99a46cec8c5cd9f06f8ba7feb6880ceab7be5f1538789de798bde5beae3b9cead16dbca50064746ef70232455101cef43a9e8e23c46b2a7fe115336c438f0ad030f34b4a7be96dc785dd8bcc67c4dd55e75877553b9a1778809edcb29b", 0xd8, 0x2}, {&(0x7f00000004c0)="d27d04c55b9cc38599d2634234b369d945496ab4120099375c21300d7ecb11d34344862980fef291569a006db4fea505d06d58712dfd9715d202fce51a13009f2b44000a25856beacf4ab04cdeb32db4b50b4e666d9ce63bc53775533bbeb56d91a36f6c30f79f0838ff54a8a277b2b09e", 0x71, 0x8}], 0x2010040, &(0x7f0000000700)={[{@commit={'commit', 0x3d, 0x2d}}, {@test_dummy_encryption='test_dummy_encryption'}, {@usrjquota='usrjquota='}, {@grpid='grpid'}, {@grpjquota='grpjquota='}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@noload='noload'}, {@noload='noload'}, {@noblock_validity='noblock_validity'}, {@oldalloc='oldalloc'}], [{@measure='measure'}, {@obj_user={'obj_user', 0x3d, 'bdev\x94cpuseteth0bdev]$posix_acl_access\'vmnet1'}}]}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x4c982, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpeername$unix(r0, &(0x7f0000000180), &(0x7f0000000280)=0x6e) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000001400)=[{&(0x7f00000002c0)='\'', 0x1}], 0x1, 0x8180d) socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000000000011, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast2}, 0x1a) r3 = socket$inet6(0xa, 0x2, 0x0) fcntl$getown(r0, 0x9) setsockopt$inet6_int(r3, 0x29, 0x0, &(0x7f0000000280), 0x3) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r1, 0x4c01) bind$unix(r4, &(0x7f0000000580)=@file={0x0, './bus\x00'}, 0x6e) ioctl$int_out(r1, 0x5461, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x4000000000000004) socket$packet(0x11, 0x0, 0x300) 13:35:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x481300, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x7) 13:35:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$inet_buf(r5, 0x0, 0x25, &(0x7f00000002c0)=""/167, &(0x7f00000000c0)=0xa7) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)={0x5, 0x401, 0x3, 0x0, 0x0, [{r1, 0x0, 0xf7}, {r4, 0x0, 0x7}, {r3, 0x0, 0x91d}]}) bind$inet(r3, &(0x7f00000001c0)={0x2, 0xffff, @empty}, 0x10) [ 1057.255505] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 13:35:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:07 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000440)=0xe8) mount$bpf(0x0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='mode=00000000000000000000005,mode=00000000000000000007513,mode=00000000000000000000005,fowner>', @ANYRESDEC=r1, @ANYBLOB="b0f7c4f2902a671528ea258dc8d60bc1c47f18d4128993dbef3bd74e3ba392ecd1bf95513a1dd9ffff496459c37d7b1af8d06f7d0000ae05e0bd20236c3e1161ccd38ac643d4eda852fae48a4bd93bf1eb13bdef6f789b61f60147ae42edacb6912dfaa7cfe2da55118260c65fda28818c4b6fb63fc9d71cb4b2d30f1b6a4400"/137]) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="4cdb3852183f518c43ea399cacbcd665", 0x800, 0x0, 0xff, 0x1}, 0x100000176) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) poll(0x0, 0x0, 0xffffffff) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) openat$null(0xffffffffffffff9c, 0x0, 0x100, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa290, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x88001, 0x0, 0x0, 0x8}, 0x0, 0xf, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000003c0)="fc0000004a000704ab092500090007000aab80ff0100000000003693e0000100ff010000000500000000000000036915fa2c1ec28656aaa79bb94b46fe9058b01d43000000070002000000000000006c6c256f1a272f900e2e117c22efc205214000000000008934d07302ade01720d7d5bb13aa056e3045c91a3e2e80772c74fb2c0011a822c9afea7dc2add7f671fd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295d394e0ad91bd0734babc5c3f2eeb57d43dd16b17e583df150c2a8e776f79514a5867b4d5715587e658a1ad0a4f01731d09b0350b0041f0d48f6f0000080548deac270e33429f", 0xfc) pipe(&(0x7f0000000800)) fcntl$setpipe(0xffffffffffffffff, 0x8, 0x80000000) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000340)=0x5) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000080)={0x5, 0x13, 0x11, 0x1, 0x9, 0xfff, 0x3, 0x63, 0x1}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) socket$inet(0x2, 0x3, 0x1f) 13:35:07 executing program 2: ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x10, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/39, 0x27, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="0300000000e3ffff07001b8100000000"], 0x2}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) socket(0x4, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f'}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f0000000340)) socket(0xa, 0x1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0xfffffffffffffffd}, {0x801, 0x0, 0x80000001}]}) fadvise64(r2, 0x0, 0x401, 0x3) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302000000030b43026c26236925000400fe7f0000bd2dca8a9848a3c728f1c46b7b31afdc1338d509000000000100005a", 0x30}], 0x1}, 0x0) 13:35:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r4, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r8, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r8, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r8, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r8, 0x0, 0x485, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r9, @ANYBLOB="1f000000000000001800120008000100767469000c00020008000100261e3502620140e4030cbda966eb264a1f717fdc73655bb139bd2903b51b6bc85a8291d1af7e38377c1c940141fdaeaa0becf7ffffff794e5462c3570e51ac036a9847feeca922ddabacd7caa47343e5f53c5c2f7b7856ed4bced1dcc3f8b8977e68c4cc25ba2bb5c2f4db856cd385f55968cc90eeffb1c048608dbe4c5d815de4356a800741f9e4cef30878d711ce201b9d4d5fcad5390704b7717bf2bb03a40e8cb345d6eba736907f62b091319946579534cfac3bf33aa77d2959e42ebd32a3b7e3d4ad38231fd4996c83c6c2631f2d035174fde6889f7fff8fe6364450691c9158ca88106f5696cfc2c0cc2a219fe629a302ae278b0b3434c06b154bbf9e32a4b21851c5bce98f88c820ef446118523f559a5df394a3fee4f50bfa2d374fc8eb7c7f7027acb764c1b0b4ff1867719d7fb588b31a662b20b44d0615710fc26c82ba373f934ea810e19868063981f5", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e40)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) sendmmsg$inet(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)="6bf2e66a7e0c2331dcab41af1371a9eeb2827ad3b64cfd914905200e87bd143dbcee9681546dd95db914bb573324f9b1375cba83bef40b6097be112643d3d8b597956e837ebf7f1448233b9d565631806fd0e1238ec47de8e4fbda1c01d7b2bcd6b12fc42f9f97cbd033", 0x6a}, {&(0x7f00000000c0)="d026e8af84b59c147e56055452c3ffb7ac4f4e99ecd9b0a1c0ff68ce494c40340a7d6317c505051161e1f9e6312d73fe6d889e8ff0fe395175c5304d047e38768402e5f4f4c79c83939d77c40f304c1cc3e1ecaef0d3809fe3bb0ba4dec2e179ab5e3b626fda9e022aad7bb7", 0x6c}, {&(0x7f0000000140)="42473e9162f1faf254912b62b23ab25d48881c8b5a660275054446197d0c47f03cdda4a948ed6af44dbd46cf389a7f6b38ddc6f731b57b3410e1df27697883f39ee94614a3ce27de2abf60fd441c29411b76bb6ca21ecbd4af73950066f443bb34904740cacaeb106691453afef3f7d3c583065bb6848d4b127feef8ef7b6a1c489e00111e9df4d72c497262b0473e7516ed99fb8bf23417728cc01199c16ecbdfa149c08e8732fe7d99221c7f77391316250f04e4be0246f962fae0321e181d22c4010a40e7a684bda1ec1be286e59fcc211efaa357d77ccafee0ec624a28cb6191d7c4fae57a0ef173cff8", 0xec}, {&(0x7f0000000240)="82d7139265dc15e9dc2baffa0e3289bce198b5711d86a07528843d0c5a6905a4d92e024e487650083b23e50a9d66fb422936f0bb7918889e9d3a988e4c6e25aa5d74b93cc35272e97e2ef3fa8d9d3fe90fe096afa296c267372103a99a57c08e95", 0x61}, {&(0x7f00000003c0)="39205454c104ff4c05fdf5883d5405e9367ea32fca352411d4775a20123321c9c1c590dbe11eef5065be8f171b6defee714d9dee0c5736b1cba4302a7d8df28db3949971aa2329dabc68d155c6322a2b55e9217488854cea7a255518a1efd852801c480bf1f288fabadb909e7de6efdaa69952418105787643046dbb6e73534470db210a35493b89d017bda3e6777eddf4acd21b071c61cab11fa924949c87798649af828f8c4778234b66a1192e26622b52b6c68a9d2a18c9587ecaf0ec151989e28ba5878a6536f28c9778a346b7a0dd3974895ab0e81558a2e4", 0xdb}, {&(0x7f00000004c0)="38d5b06ddf242231d810525c9f71c72056a6eab426f38961e9ff9e6c5f2162bb3ed2121170606a61cf7f61e361acd0dd6e9b3e2b1a47a8523062fe40af52d0c67191449c8119340e7b3e8ee0be4b5cf0d8ca12af2f85299f64bf89ff3efb50f834e71f27c9d2feee365d1a432724c866d4063081bc779c6a83261fd89112703dee97cd74b5f524fc1a4c506f69104d3237191d4b0859718237c2f8aed2646400ed4b912a269e5400f47165be6e", 0xad}], 0x6, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xd7}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}], 0x70}}, {{&(0x7f0000000680)={0x2, 0x4e21, @rand_addr=0x313}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="a5a3a318ead320ac35b26ef8af7144c67d368fb68e9c5a630154707347e1f89c125af8b78bc2a0e7217cae03f95b77fa50f60f94bf8b14d1d8aa6c4aba2874e8cda1063f329f1890e55b8505513ac33786636df733e1b2a53c0939e3029cd12ff34ff09bb4406db86d5289bf16940ae670e8beee658a831a9e618580a5aa3158e51d58b5137645b4b7f460f170597d73c1fd59db2e", 0x95}], 0x1, &(0x7f00000007c0)=[@ip_retopts={{0x64, 0x0, 0x7, {[@lsrr={0x83, 0x17, 0x9, [@multicast1, @local, @remote, @rand_addr=0x200020, @local]}, @timestamp={0x44, 0x3c, 0x74, 0x1, 0x8, [{[@dev={0xac, 0x14, 0x14, 0x1d}], 0x80000000}, {[@dev={0xac, 0x14, 0x14, 0x12}], 0x6}, {[@initdev={0xac, 0x1e, 0x1, 0x0}]}, {[], 0x1}, {[], 0x9}, {[], 0xfffffffa}, {[], 0x10000}, {[@rand_addr=0x4], 0xfff}, {[@rand_addr], 0x4}]}]}}}, @ip_tos_u8={{0x11}}], 0x80}}, {{&(0x7f0000000840)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000880)="7c80ae27cb5f5cc30698d8b7ca2f398fbb3e0575b9e96a7a370eee9523015cae1b86e433800fa952023ec5e3ddb9dfac4063771ea12f71ccf48e6269116a7ad9317a124351d9102470f1de0fdcaa191bb7ba7f4c92f0c92eb8f0460925c11a06b1855ea6dc815cef8433805d4a64f6ea0c864cb7e00e536e19d35c43ed92ffc70c32c5a9c6b3dd1405f9fb10c5cdefb44027d115d1", 0x95}, {&(0x7f0000000940)="b0aadd90a69612bd8be0e3a191289bee86c7058709a3d883e6297c93762b63053601393ebe7e2c55227d9590d39d0aa7e426de0afa47dcb4f6af98dc4f2f71de4160c8d7", 0x44}, {&(0x7f00000009c0)="92e26fedfa7694f8a2fc1b51ec6f1878a5f1c7f5e42271103456b8cb0df2ec709b81830fe1b467f453ff5a4ddc0bbba992323c24225b2cbbb570a9da52475fd4dc32d428d895661e1ce930bd60d9e97e933ed214808ee410fec27586a7dc79cc3aa4f7ef39be8850ed7af788bde10cba71e8c6399e5723b2ba90bbab0784c578ba21f6ec1e6522d525b4bd4180cd5d477e73a8b8405981be662868361d2f795845dba83a8d24987ca6f8d8eaf04ed303e785", 0xb2}, {&(0x7f0000000a80)="2ce0523f99869fa5421eb30d0df63b485a866814a5a11b360d1a580f16660f40c727dcc1b9c23a81b99dae7fbdbe477b0d7bbdb7ef3ba222855cd2b5118dfb3bbe09077e8e33299d7bca6ca2b31351d7", 0x50}], 0x4}}, {{&(0x7f0000000b40)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000dc0)=[{0xffffffffffffffff}, {&(0x7f0000000b80)="10e5828d3180ef7706ac83fee5d27ef0932aae4899dd0f68b337ac2d1a9b585cb6d9a4fd206ba993def79fb8756cdda38c314174ec8da3020f494aa1540ed11c532226a8e994df09519320eecc639b577710bc794916a3e1f6fd0396fe38d8f4a1b25a32891ed96fb8a137f297ed04fdb4e6b85369727536bd5534f8266ba507cf9d0d33a35265812a0c630557dc394f03d3c0a4ee4b13d60f2598a952c6dcbc966471355a42fc5ac8ac3461973de9293c05c23178967b50", 0xb8}, {&(0x7f0000000c40)="c78c43ce3823b52005ebab41f828200995750debc2231760f53a2084e6b088bb050976278a61ead68b4b7e8fb48523dee7d636c1ee9c1d0d778944ee6a6b7fadca84282388a4217d34890185ce0c3110e33b6e25e953fe6c4992b98a924f8993ac7b7849a9549860b081", 0x6a}, {&(0x7f0000000cc0)="9509592ac3ab6ff6675ebecbdc2a66f16f93ee4f5051bc0c156a72a23cc34d2bb5a22bba8f4e846515f51e41fad504f782f684e8e3b0850c67ab67754456088f51917e87a5e0ec3fe8f4b1b47f662a95194bd37317b94830b86a56622dbbb9d50b9a870821ff010c25ec863df1032c4f00bd4b3519d86a1d600196362a95288da34aca90998b85650d84df68bd18", 0x8e}, {&(0x7f0000000d80)="3a95fa9b35950cdcf7957edc801a41c9155b61b3aa", 0x15}], 0x5, &(0x7f0000000f80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x13}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x401}}}], 0x70}}, {{&(0x7f0000001000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000001140)=[{&(0x7f0000001040)="f685c4670b889c52a45df7604a1ae726fe6a78fde5ecf2f579a6315d114701a127d698d99e17e38175bdc1b0b7faf94e5007944b978250c2ea4d0aa406f469bb62a1183716f4005254bfbcc7febf9922fd3ca3198df2d22028f9098db90349e0f45dd562fade42f0d1bec81e563bdc16f21c552e4c956fd2d00d7de221ab1799b530e12d1c7bdf4dce771e8ba6e0c9c9717f271767b668879688dcaa4c2d2ce79f334af2944afff052b6d896fd0e82cd59b2788d1b7c0d30aceda3aaa3aceb8e87046a41412f2e143f2e5f24d79eb52a1d533024783c3cf172969510eccf401669509fa7030d30299280e145884019e7d305a7", 0xf3}], 0x1, &(0x7f0000001180)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x30}}], 0x5, 0x8808) 13:35:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:07 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r3 = accept4(r2, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x80, 0x40000) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') getpeername$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$inet_mreqn(r3, 0x0, 0x3, &(0x7f0000000140)={@remote, @dev={0xac, 0x14, 0x14, 0x23}, r5}, 0xc) 13:35:07 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 13:35:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1450}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000200)=0x1fb) ioctl$FS_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000000)=0xa8) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000002c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0xb0, r3, 0x2, 0x70bda9, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @empty, 0x12efbab2}}}}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3b92cf5}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xc38b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x96}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x29}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20402}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x114, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x56283121}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb2f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x41d2197b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffff5e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x51}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40008800}, 0x40000) inotify_init1(0x80400) recvmmsg(r0, &(0x7f0000002100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:35:07 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10010000000036) ptrace$getsig(0x4202, r0, 0x4, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) 13:35:07 executing program 5: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x6, 0x7) sendmmsg(r0, &(0x7f0000002f40)=[{{&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x2, 0x3, 0x0, {0xa, 0x4e24, 0x9, @remote, 0x7}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000001c0)="3847228730189faac79121c8c7569cc5468dbac8913e819b87307c754fa420704cec9d38eab72e645240ce3e9d7c2f735b6b766f6fbd36b438056c88cde8fe051e08ff4ca9bd018fd0f9c8916bd7ba725e183a70766d4d7408978ef13b79eff80dcca1bf46ce20efe1594d6b648bb04b88962a6a37112b1d999ac5b694afabaafe4552a20515fb415d56d77c8abaf32c3ab9d1fd997e1926c22796902a6ccaa4469d377859dd61a4bb838474bb517698c6c2f5d22751ae3cfb037952fc47c7b05003856848cc726d0473d5e875ee7efc86ec6ca7fc242e21b86d9ff6", 0xdc}], 0x1}}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000000400)="90a18d9c1ea5eb944ab9ef220d616c26446c62b7a35381417daa566129310189dc5f81d9ef4e1516c71d2953fa5da4df6ef1418bf822b41bda9939f7924c4d1982226ee5f2c570db28b8035ba3190bc17312aecb903b481ee621890782c773526f25c090c9631faa9de9f221", 0x6c}, {&(0x7f0000000480)="d627cb46b4b8efaf1843f2268e14090b162af81b9efe6f8490fc76040c643f449fa1a5d0a1c1ff0f5a5c6d7464c1ca7b458e91c2b8ce69005043b6292a450e79c2494da4bc565a54328c5f6d3f1d306462b73fea16bb75cac96942d96726c8afa242670b18d9fa11acc1843b874abe3ecb280d778e7e54cb444556ccce7ae6", 0x7f}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="0168aed000cd5695d016ad66cafa9d26cc026ba0bdcf10da3311bb83bbdf772943bd86e67e3d5dd88a92cb5fba75b7d98d06df1623805a43361a9d45c6504b5c724bd0b12514bc4681fe53ddbaec13469d9db8a4", 0x54}, {&(0x7f0000001580)="8e4ee221eb4c84f8d6c20eed8654e2b2e8a8ae785b6590530873a071b07db41b8da0e582ad67e06e3ea57d0bfcc418b75a4f03102cacd1894d6cca284e4987fc3ab428cdda732dc36e236de2d1feaf7ab7249d987cd3866d1ed4782be8115b5176764a2027033a02e428f1ea53205e01dc94538773191c5cf82bb29799fac0d1d2d1b001b5d52f89a36a2e4872cf68ad", 0x90}, {&(0x7f0000001640)="c15fc91eae3a8c595141b334c5de7579785d34732d9b2d5d2a9023e4a43425883ae11ec531188dd8f83239b4dd2143ba3532431016dd625ecf6584f9a649f68b06c5368c104cc41872985605ff471b3cfe2b837bf62a771cd3b83251760bc61477a720a7f1fa9c0ee48697175148902ee12ce99d1c7c0562a8295a5855a8c743e452579e2d26654c8fed85e6cf93e610d433454918e325572cb7f59fbe0f6e93075a535ac0e39082b9d016fb12c7c2211f1f84c117fd4ff4636cb4b33786c2a3dd8dec526f215af786ffe4ffe34a29f7b2528c2861769c8facd9b630ae22d18f688533c18b86f309e0b9e7a8d68b001c14c7f3f56a60", 0xf6}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="bacae9c165ac4102f9e25868f2cda481c6ed999ec6df2fbfc2fd7f29989019ac146e5382cc85afec23472a7cfce9be70378b8010bf436130200dfae8f89d0750aa24cfda0144d004372e4b42922dbe4f473f6871e5739e84cfd2ea49040f6a3686fcd607429074bdcf29f3e29e70cdcd57667d0b75b87239a1f84c1ad380b28af5ec7015ca6c86883f61652029ddd79b57c2655759f88da85162fec457065ad93c083e4b6bcb3cab2ea8ea8c8438c2017ccd7bb06a7109252e1021c96e7ffb049f236bb3be41e6f1298bfc793e7f1a04145e2ef96c5ef57b24f9b93544f8", 0xde}, {&(0x7f0000002840)="ee8cb660258889f9ad717ca10643a889fbb697ef88a6568d16020577e7f931b79aec61a9120f610f8b4f9b9ead92ceeafde192e959f2d67f6fce525922eab3fa41cc412d353781dbb5b2e09f3bd63abf769da9969a8d34f23feec3ab43b3fa236b9669d4244b57154a37ffeab077bbb847e17fbf0b21f0", 0x77}, {&(0x7f00000028c0)="b900a1eeddc455381f851abd6c6f85b99986b7a4d86b22a065db11c86a7bdef2aa8fb98badf5b145fc61cdc7ae621968dbcc52b005a24a33a933b0638d8f1b3a1f57edec6dd1d17515363928ba1a5e2d4bde345752dcd43d4553bedd0302c59670824e942a4148260ccd6962461371d4c11448b4c86d331eedff243568b1a98ab0631e073e257df2b7a28605ca8074bce00919278c91bf89e1cece8659438a3aa308b4949f1c5f1480480fd5b18106c7f2679afa358de3566694edc581096733124258bfadda17d19f4603f2fb", 0xcd}], 0xa, &(0x7f0000002a80)=[{0xb0, 0x107, 0x4, "699410f4c8e3df1061ffa267278898075b3eff1a6c19d8e09319a3fc0f0293f07a57d7f1ffe5397a238f3186a108462c010e1ad21a24c087a422b5cb5ef4fefeb4d98069eeaf51299f64b846bea56dea8bfdecb2a65aee944d2ac33975c10440c3fee7bb5d016178d4a25a2a722535ed03b59abbdb5dcc4d153c34ac3a435b88d4bef88d05a8315b486bdd4fb3dc80d5c87bac2df5a734e0501cec90bf53"}, {0xe8, 0x10a, 0xde, "a9b4de49e85a86ad74c917cab48d3aba5f008bd44baf2f2e562c7f3914e764f36495d00af4ac0a7ab5022e17bfdbcab6106d97107ff2513503c2a3d03571629e9958f89615a77adeee0d06e072915c5cd40c08103efe3c7f17f5c7bd19073c54ad8ac4f4dedc26f38dbd664584e5530a889d1ebf7820aeb2cc161c7290c0dac4d13ee971aca6ffdb6663419b83e70cf17a2f6833f2a01ed78d89a16d7ee372581df6989f21343536b5351ccf4e8c00d9232fe4683b0777bff02ba16a053248484d2ed0df96298b1a1332f35ceb12ef8f5ba1"}, {0x10, 0x112, 0xb8}, {0x50, 0x119, 0x4, "2d7d469e2ee8ff21d600f018b7919e32f78a1fa036ee6cfd119dd6bcb5688cef051da63b59fbf1cc75f4e8877c99bd133d90043721a17aa88c3176a00a85d7e9"}, {0xc8, 0xc, 0x8, "8a0e7c7a989e9a0d6ff5f85893a3dee8549848759764e57d262a0ccd76e69639dce3909898b74490999a8251febfb3c40306008cb1a8c7322ec9e66c13a6c2ad62803718f8094d397af326e8b29e0788f65f34d2dd0fd92aba0f52b4944f05996c81e4ce9653dddba6bacb9200087af6931ae5165eaf0c71180d905b744e3d8bc8462a7e19fbe0b08ba3404ab87c6f974577da5c45794a994ceb445d3163d01080630b13172dd70fa12116fcaa521de64f29"}, {0xf8, 0x88, 0xfff, "577d50c5aa1c2c97c8ce4cb86795a55d03428f8ae49ee50e3584192f37875edbfc786673ab621e07b32d9e4bf7e7191d757f4e58ce19edd08437deae55c675d128df43cf764e5d8b2560b31c06831453eb262e363b7221cd7fea2a5b86b7ac2e681e8b58d6a9023fa5ab50cfdfeb165f401ce651aca8634c447f4af99b0d25496fe2f259337fc5c58f2b26935eb6760752cd271782662fb7e518f08a60bdf8319059bdfa22d7a312813cc953674b4ba9f77f785a8febaf08e43a387ac6d4a33e06b675aa0fadd477b648c5c598554f522a647f560490c49ee133ba14405e0a319d1d4a"}, {0x40, 0x0, 0x0, "2ecedd0acfebe7c64dae9b14e4001c507e309cf23bbdddb368fefa2c8f5aade756fea0178db406fbc6"}, {0x90, 0x0, 0x100, "027fb68508eb417dcc665e0766f50488927aa69ebf0a19a3bdf9ed02d8fe5f8473c5af57ae4b3ec02ade393a1f3e486d1f704dbded8c7425828a1cf79bcce58a5926c15b1258bbebe83bf95c736297f40e90757de45b3a9778c5c4c77393f8fe3023e1b1df84eebf27d62b11ad30ce46cc3b0f8e4add0ecee2f6cb"}], 0x488}}], 0x2, 0x50) 13:35:07 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="05030000000020003500000008000000950000000000000009aa2b35ac0de21850768974699c1ddb7af986fce8a29414f92ad73bd5870009554c0fa76cacec57d7ebd16f74dbfde92affc47466968ec5c21cfc5f371327dc4c79837881891ff1f031d6eebec7f9d9106e16d6ac8480cbbb7fa733892193b22226d9645485626d215c8158f5797b696cf51b25db97e12a868c4f794a1e7298649ce1dcdcfca90ec68c3a10fd8d147b19d009fc3b9856c712e4ff24b5584ac75ea3a1f48b80cb69f98ed925be0392122736"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x597, &(0x7f000000d000)=""/153}, 0x3e) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r4, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r4}]]}}}]}, 0x38}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r8, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r8, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r8, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r8, 0x0, 0x485, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r9, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r9}]]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e40)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000f40)=0xe8) sendmmsg$inet(r0, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)="6bf2e66a7e0c2331dcab41af1371a9eeb2827ad3b64cfd914905200e87bd143dbcee9681546dd95db914bb573324f9b1375cba83bef40b6097be112643d3d8b597956e837ebf7f1448233b9d565631806fd0e1238ec47de8e4fbda1c01d7b2bcd6b12fc42f9f97cbd033", 0x6a}, {&(0x7f00000000c0)="d026e8af84b59c147e56055452c3ffb7ac4f4e99ecd9b0a1c0ff68ce494c40340a7d6317c505051161e1f9e6312d73fe6d889e8ff0fe395175c5304d047e38768402e5f4f4c79c83939d77c40f304c1cc3e1ecaef0d3809fe3bb0ba4dec2e179ab5e3b626fda9e022aad7bb7", 0x6c}, {&(0x7f0000000140)="42473e9162f1faf254912b62b23ab25d48881c8b5a660275054446197d0c47f03cdda4a948ed6af44dbd46cf389a7f6b38ddc6f731b57b3410e1df27697883f39ee94614a3ce27de2abf60fd441c29411b76bb6ca21ecbd4af73950066f443bb34904740cacaeb106691453afef3f7d3c583065bb6848d4b127feef8ef7b6a1c489e00111e9df4d72c497262b0473e7516ed99fb8bf23417728cc01199c16ecbdfa149c08e8732fe7d99221c7f77391316250f04e4be0246f962fae0321e181d22c4010a40e7a684bda1ec1be286e59fcc211efaa357d77ccafee0ec624a28cb6191d7c4fae57a0ef173cff8", 0xec}, {&(0x7f0000000240)="82d7139265dc15e9dc2baffa0e3289bce198b5711d86a07528843d0c5a6905a4d92e024e487650083b23e50a9d66fb422936f0bb7918889e9d3a988e4c6e25aa5d74b93cc35272e97e2ef3fa8d9d3fe90fe096afa296c267372103a99a57c08e95", 0x61}, {&(0x7f00000003c0)="39205454c104ff4c05fdf5883d5405e9367ea32fca352411d4775a20123321c9c1c590dbe11eef5065be8f171b6defee714d9dee0c5736b1cba4302a7d8df28db3949971aa2329dabc68d155c6322a2b55e9217488854cea7a255518a1efd852801c480bf1f288fabadb909e7de6efdaa69952418105787643046dbb6e73534470db210a35493b89d017bda3e6777eddf4acd21b071c61cab11fa924949c87798649af828f8c4778234b66a1192e26622b52b6c68a9d2a18c9587ecaf0ec151989e28ba5878a6536f28c9778a346b7a0dd3974895ab0e81558a2e4", 0xdb}, {&(0x7f00000004c0)="38d5b06ddf242231d810525c9f71c72056a6eab426f38961e9ff9e6c5f2162bb3ed2121170606a61cf7f61e361acd0dd6e9b3e2b1a47a8523062fe40af52d0c67191449c8119340e7b3e8ee0be4b5cf0d8ca12af2f85299f64bf89ff3efb50f834e71f27c9d2feee365d1a432724c866d4063081bc779c6a83261fd89112703dee97cd74b5f524fc1a4c506f69104d3237191d4b0859718237c2f8aed2646400ed4b912a269e5400f47165be6e", 0xad}], 0x6, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xd7}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}], 0x70}}, {{&(0x7f0000000680)={0x2, 0x4e21, @rand_addr=0x313}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="a5a3a318ead320ac35b26ef8af7144c67d368fb68e9c5a630154707347e1f89c125af8b78bc2a0e7217cae03f95b77fa50f60f94bf8b14d1d8aa6c4aba2874e8cda1063f329f1890e55b8505513ac33786636df733e1b2a53c0939e3029cd12ff34ff09bb4406db86d5289bf16940ae670e8beee658a831a9e618580a5aa3158e51d58b5137645b4b7f460f170597d73c1fd59db2e", 0x95}], 0x1, &(0x7f00000007c0)=[@ip_retopts={{0x64, 0x0, 0x7, {[@lsrr={0x83, 0x17, 0x9, [@multicast1, @local, @remote, @rand_addr=0x200020, @local]}, @timestamp={0x44, 0x3c, 0x74, 0x1, 0x8, [{[@dev={0xac, 0x14, 0x14, 0x1d}], 0x80000000}, {[@dev={0xac, 0x14, 0x14, 0x12}], 0x6}, {[@initdev={0xac, 0x1e, 0x1, 0x0}]}, {[], 0x1}, {[], 0x9}, {[], 0xfffffffa}, {[], 0x10000}, {[@rand_addr=0x4], 0xfff}, {[@rand_addr], 0x4}]}]}}}, @ip_tos_u8={{0x11}}], 0x80}}, {{&(0x7f0000000840)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000880)="7c80ae27cb5f5cc30698d8b7ca2f398fbb3e0575b9e96a7a370eee9523015cae1b86e433800fa952023ec5e3ddb9dfac4063771ea12f71ccf48e6269116a7ad9317a124351d9102470f1de0fdcaa191bb7ba7f4c92f0c92eb8f0460925c11a06b1855ea6dc815cef8433805d4a64f6ea0c864cb7e00e536e19d35c43ed92ffc70c32c5a9c6b3dd1405f9fb10c5cdefb44027d115d1", 0x95}, {&(0x7f0000000940)="b0aadd90a69612bd8be0e3a191289bee86c7058709a3d883e6297c93762b63053601393ebe7e2c55227d9590d39d0aa7e426de0afa47dcb4f6af98dc4f2f71de4160c8d7", 0x44}, {&(0x7f00000009c0)="92e26fedfa7694f8a2fc1b51ec6f1878a5f1c7f5e42271103456b8cb0df2ec709b81830fe1b467f453ff5a4ddc0bbba992323c24225b2cbbb570a9da52475fd4dc32d428d895661e1ce930bd60d9e97e933ed214808ee410fec27586a7dc79cc3aa4f7ef39be8850ed7af788bde10cba71e8c6399e5723b2ba90bbab0784c578ba21f6ec1e6522d525b4bd4180cd5d477e73a8b8405981be662868361d2f795845dba83a8d24987ca6f8d8eaf04ed303e785", 0xb2}, {&(0x7f0000000a80)="2ce0523f99869fa5421eb30d0df63b485a866814a5a11b360d1a580f16660f40c727dcc1b9c23a81b99dae7fbdbe477b0d7bbdb7ef3ba222855cd2b5118dfb3bbe09077e8e33299d7bca6ca2b31351d7", 0x50}], 0x4}}, {{&(0x7f0000000b40)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000dc0)=[{0xffffffffffffffff}, {&(0x7f0000000b80)="10e5828d3180ef7706ac83fee5d27ef0932aae4899dd0f68b337ac2d1a9b585cb6d9a4fd206ba993def79fb8756cdda38c314174ec8da3020f494aa1540ed11c532226a8e994df09519320eecc639b577710bc794916a3e1f6fd0396fe38d8f4a1b25a32891ed96fb8a137f297ed04fdb4e6b85369727536bd5534f8266ba507cf9d0d33a35265812a0c630557dc394f03d3c0a4ee4b13d60f2598a952c6dcbc966471355a42fc5ac8ac3461973de9293c05c23178967b50", 0xb8}, {&(0x7f0000000c40)="c78c43ce3823b52005ebab41f828200995750debc2231760f53a2084e6b088bb050976278a61ead68b4b7e8fb48523dee7d636c1ee9c1d0d778944ee6a6b7fadca84282388a4217d34890185ce0c3110e33b6e25e953fe6c4992b98a924f8993ac7b7849a9549860b081", 0x6a}, {&(0x7f0000000cc0)="9509592ac3ab6ff6675ebecbdc2a66f16f93ee4f5051bc0c156a72a23cc34d2bb5a22bba8f4e846515f51e41fad504f782f684e8e3b0850c67ab67754456088f51917e87a5e0ec3fe8f4b1b47f662a95194bd37317b94830b86a56622dbbb9d50b9a870821ff010c25ec863df1032c4f00bd4b3519d86a1d600196362a95288da34aca90998b85650d84df68bd18", 0x8e}, {&(0x7f0000000d80)="3a95fa9b35950cdcf7957edc801a41c9155b61b3aa", 0x15}], 0x5, &(0x7f0000000f80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x13}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x401}}}], 0x70}}, {{&(0x7f0000001000)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000001140)=[{&(0x7f0000001040)="f685c4670b889c52a45df7604a1ae726fe6a78fde5ecf2f579a6315d114701a127d698d99e17e38175bdc1b0b7faf94e5007944b978250c2ea4d0aa406f469bb62a1183716f4005254bfbcc7febf9922fd3ca3198df2d22028f9098db90349e0f45dd562fade42f0d1bec81e563bdc16f21c552e4c956fd2d00d7de221ab1799b530e12d1c7bdf4dce771e8ba6e0c9c9717f271767b668879688dcaa4c2d2ce79f334af2944afff052b6d896fd0e82cd59b2788d1b7c0d30aceda3aaa3aceb8e87046a41412f2e143f2e5f24d79eb52a1d533024783c3cf172969510eccf401669509fa7030d30299280e145884019e7d305a7", 0xf3}], 0x1, &(0x7f0000001180)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x30}}], 0x5, 0x8808) 13:35:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') recvfrom$unix(r1, &(0x7f00000002c0)=""/144, 0x90, 0x100, &(0x7f0000000480)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x20801, 0x99) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r5) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0x1}, {{@in6=@mcast2}, 0x0, @in6=@local}}, 0xe8) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/enforce\x00', 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) ioctl$LOOP_CTL_ADD(r7, 0x4c80, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r9) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={'veth0_to_bond\x00', {0x2, 0x4e24, @loopback}}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) socketpair(0x2, 0x6, 0x3f, &(0x7f0000000080)) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_FWMARK={0x8}], @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r4}]]}}}]}, 0x40}}, 0x0) 13:35:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x401) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r3, &(0x7f0000000240), 0xff13) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x4000, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 13:35:08 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:08 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x177, 0x4) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000100)=0x6, 0xffffffffffffff16) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r2 = accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x800) recvmmsg(r2, &(0x7f0000f61000), 0x0, 0x2040, 0x0) 13:35:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0xfffffffffffffff8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000005c0)=ANY=[@ANYBLOB="000005000180c2000000aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaab26e9dc257b426c5a7b23ce9e0d78f130a05612c9653f0914a798ee395510f121d199d9dfb83ff022a70bae93259594337920b3b8a4f9ab60c3300c48b013ea9b64ad8826079259bb805b5f4417ed450bf42499f2133753e44e6d12afa85fc61b95f2e5ad3036a0be381a4cd46628c60b7d7b111a3d69a2518751a4c6a64d233bcd55599e12c3aaf192a8d3ffd13f4d05f38c754a586b77a551f6b9eddc7e5c56b851a44c20ba8dfa761daf90ea80be18f6b"]) r3 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x950, 0x882) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x28b, 0xc02) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000240)='\'', 0xfcc9}], 0x1, 0x81805) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100026}, 0xc, &(0x7f0000000080)={&(0x7f0000000780)=@getlink={0x304, 0x12, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x918, 0x1000}, [@IFLA_MTU={0x8, 0xe, 0x1ff}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x7fffffff}, @IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}, @IFLA_PHYS_PORT_ID={0xc, 0x22, "85a84f71cbc7c510"}, @IFLA_VFINFO_LIST={0x28c, 0x16, [{0x4c, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x400, 0x9}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xb97, 0x100000000}}, @IFLA_VF_RATE={0x10, 0x6, {0x9, 0x5, 0xce6}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1}}, @IFLA_VF_VLAN_LIST={0x4}]}, {0xb0, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x0, 0xad3d}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xaf, 0x1}}, @IFLA_VF_VLAN={0x10, 0x2, {0x2, 0xe20, 0xfb}}, @IFLA_VF_VLAN_LIST={0x68, 0xc, [{0x14, 0x1, {0x2, 0x56e, 0x100, 0x88a8}}, {0x14, 0x1, {0x0, 0xa2, 0x3, 0x88a8}}, {0x14, 0x1, {0x8000000, 0x607, 0xf, 0x8100}}, {0x14, 0x1, {0x1000, 0xf99, 0x80, 0x88a8}}, {0x14, 0x1, {0x5, 0x3b0, 0x0, 0x4928}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x10000}}]}, {0x8c, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x20, 0x9}}, @IFLA_VF_VLAN={0x10, 0x2, {0x101, 0x89d, 0x88}}, @IFLA_VF_LINK_STATE={0xc}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x400}}, @IFLA_VF_VLAN={0x10, 0x2, {0x6c180, 0x4c8, 0x80000001}}, @IFLA_VF_RATE={0x10, 0x6, {0x7fffffff, 0x9}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x6, 0x1033}}, @IFLA_VF_MAC={0x28, 0x1, {0x0, @link_local}}]}, {0x30, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x0, 0x7}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, [{0x14, 0x1, {0x1, 0x107, 0x0, 0x4dfc}}]}]}, {0x2c, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x8}}, @IFLA_VF_VLAN={0x10, 0x2, {0x0, 0xccf, 0x9}}, @IFLA_VF_TRUST={0xc, 0x9, {0x5, 0x7}}]}, {0x10, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x0, 0xecd7}}]}, {0x94, 0x1, [@IFLA_VF_MAC={0x28}, @IFLA_VF_RATE={0x10, 0x6, {0x7, 0xb167, 0x2}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1}}, @IFLA_VF_RATE={0x10, 0x6, {0x5, 0x0, 0x1f}}, @IFLA_VF_TRUST={0xc, 0x9, {0x2}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x9, 0x3}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x0, 0x3, 0x6}}]}]}, @IFLA_PORT_SELF={0x4}, @IFLA_TXQLEN={0x8, 0xd, 0x9}, @IFLA_EVENT={0x8, 0x2c, 0x6}, @IFLA_LINK_NETNSID={0x8, 0x25, 0x3}, @IFLA_EVENT={0x8, 0x2c, 0x10000}]}, 0x304}, 0x1, 0x0, 0x0, 0x800}, 0x20040010) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000b80)={{{@in6=@empty, @in=@empty}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xfffffd5a) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) sendfile(r2, r3, &(0x7f00000001c0), 0x20002000005) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000c80)={'veth1_to_hsr\x00', &(0x7f0000000dc0)=ANY=[@ANYBLOB="200000030000000000000074e37835be8de1f0d18ebf89e17bce1fdbf814f7d5f68717509f2e6a45896a8b8b671fb364d5139b10052df24d700cee5779d48a507dfea868d663c24f62515bb805d6f6139893c266ab864156b9559739ebdf12f7724987743636a72ccffac034a9a701c190e10923362b3101f1c7f017c2c242ae40ff4b0f2d43bbe3fc5ef3be952a49e62b04dacc2a7ac7b768678098f710fa44f75d023f455a9425caf651069fbb9866c88fe1ad0904"]}) ioctl$LOOP_CLR_FD(r3, 0x4c01) connect$inet(r0, &(0x7f00000000c0), 0x10) 13:35:08 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x6, 0x94, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007126000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf050000000000000f650000000000006507000002000000070100004c0000001f75000000000000bf54000000000000070500000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x27b, 0x0, 0x0, 0x0, [], r1, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 13:35:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0xa, 0x800, 0x81) accept$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000140)=0x6e) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000180)=""/44) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) 13:35:08 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r3 = eventfd2(0x8, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x406, 0x0) sendmsg$unix(r0, &(0x7f0000000880)={&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0xfffffffffffffe59, 0x0, 0x0, &(0x7f0000000200)=[@rights={{0x28, 0x1, 0x1, [r1, r2, r5, r1, r3, r4]}}], 0x28}, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x800000) r6 = socket$inet(0x2, 0x4, 0x0) ioctl$SIOCGSTAMP(r6, 0x8906, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x25, &(0x7f0000000000), 0x4) 13:35:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs, &(0x7f00000001c0)=0x6e, 0x80400) 13:35:08 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:passwd_exec_t:s0\x00', 0xfeb0, 0x0) write$selinux_load(r0, 0x0, 0x0) 13:35:08 executing program 3: socket$packet(0x11, 0x0, 0x300) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[]}}, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) mkdir(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x400806e, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0], 0x3}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r4, &(0x7f0000000080), 0xff97) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x27f, &(0x7f0000000080)={&(0x7f0000000840)=@deltfilter={0x38, 0x2d, 0x421, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x4}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0xfe16}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3}) ioctl$TUNSETLINK(r6, 0x400454cd, 0x30a) r7 = socket$inet6(0xa, 0x2, 0x0) dup2(r7, r6) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$setregs(0xd, r8, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r8, 0x0, 0x0) syz_open_procfs$namespace(r8, &(0x7f00000002c0)='ns/pid\x00') r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3}) ioctl$TUNSETLINK(r9, 0x400454cd, 0x30a) r10 = socket$inet6(0xa, 0x2, 0x0) dup2(r10, r9) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r11, 0x400454cd, 0x30a) r12 = socket$inet6(0xa, 0x2, 0x0) dup2(r12, r11) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x3}) ioctl$TUNSETLINK(r13, 0x400454cd, 0x30a) r14 = socket$inet6(0xa, 0x2, 0x0) dup2(r14, r13) r15 = socket$inet6(0xa, 0x4, 0x0) write$binfmt_misc(r15, 0x0, 0xffffffffffffff1d) r16 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) [ 1059.793796] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 1059.829384] CPU: 1 PID: 17478 Comm: syz-executor.5 Not tainted 4.14.154+ #0 [ 1059.836545] Call Trace: [ 1059.839156] dump_stack+0xe5/0x154 [ 1059.842731] warn_alloc.cold+0x91/0x1ab [ 1059.846738] ? zone_watermark_ok_safe+0x260/0x260 [ 1059.851603] ? lock_downgrade+0x630/0x630 [ 1059.855767] ? lock_acquire+0x12b/0x360 [ 1059.859764] ? check_preemption_disabled+0x35/0x1f0 [ 1059.864835] ? avc_has_perm+0x1b7/0x350 [ 1059.868838] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 1059.873552] ? drop_futex_key_refs.isra.0+0x17/0xb0 [ 1059.878614] __vmalloc_node_range+0x3b5/0x6d0 [ 1059.883169] ? trace_hardirqs_on+0x10/0x10 [ 1059.887429] ? check_preemption_disabled+0x35/0x1f0 [ 1059.892470] ? sel_write_load+0x199/0xfb0 [ 1059.896648] vmalloc+0x60/0x80 [ 1059.899880] ? sel_write_load+0x199/0xfb0 [ 1059.904050] sel_write_load+0x199/0xfb0 [ 1059.908069] ? sel_read_bool+0x240/0x240 [ 1059.912167] ? trace_hardirqs_on+0x10/0x10 [ 1059.916419] ? check_preemption_disabled+0x35/0x1f0 [ 1059.921578] __vfs_write+0xf9/0x5a0 [ 1059.925230] ? sel_read_bool+0x240/0x240 [ 1059.929316] ? HARDIRQ_verbose+0x10/0x10 [ 1059.931127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1059.933389] ? kernel_read+0x110/0x110 [ 1059.945801] ? check_preemption_disabled+0x35/0x1f0 [ 1059.950857] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1059.956336] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1059.961398] vfs_write+0x17f/0x4d0 [ 1059.964972] SyS_write+0x102/0x250 [ 1059.968538] ? SyS_read+0x250/0x250 [ 1059.972181] ? do_clock_gettime+0xd0/0xd0 [ 1059.976360] ? do_syscall_64+0x43/0x520 [ 1059.980347] ? SyS_read+0x250/0x250 [ 1059.984003] do_syscall_64+0x19b/0x520 [ 1059.987932] entry_SYSCALL_64_after_hwframe+0x42/0xb7 13:35:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1059.993135] RIP: 0033:0x45a659 [ 1059.996425] RSP: 002b:00007f8a84625c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1060.004155] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a659 [ 1060.011436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1060.018738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1060.026023] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a846266d4 [ 1060.033306] R13: 00000000004cb08b R14: 00000000004e3600 R15: 00000000ffffffff 13:35:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@empty, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket$netlink(0x10, 0x3, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) 13:35:09 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:09 executing program 4: pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000005c0)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0xfffe}, {}, {0x0, 0xfffffffffffffffe}, 0x0, 0x6e6bb9, 0x1}, {{@in=@loopback, 0x0, 0x6c}, 0x0, @in=@empty, 0x0, 0x0, 0x7}}, 0xe8) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) prctl$PR_SET_THP_DISABLE(0x29, 0x1) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) rmdir(&(0x7f00000001c0)='./file0\x00') syz_open_procfs(0x0, 0x0) mount(&(0x7f00000002c0)=@md0='/dev/md0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='omfs\x00', 0xa0041, &(0x7f0000000640)='.*}]selinux%proc#\x00') pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)=0xfb) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @empty}, @in6=@local}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000001c0)=0x7b) [ 1060.831547] Mem-Info: [ 1060.834763] active_anon:176712 inactive_anon:6755 isolated_anon:0 [ 1060.834763] active_file:10537 inactive_file:11783 isolated_file:0 [ 1060.834763] unevictable:0 dirty:339 writeback:0 unstable:0 [ 1060.834763] slab_reclaimable:8913 slab_unreclaimable:68919 [ 1060.834763] mapped:59495 shmem:6748 pagetables:8367 bounce:0 [ 1060.834763] free:1284604 free_pcp:561 free_cma:0 13:35:10 executing program 2: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x5) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), 0x4) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f00000002c0)) fchdir(0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xf21152d8468e6a47}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000080)={0x0, 0x7f, 0x0, 0x2}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@struct={0x9, 0x1, 0x0, 0x4, 0x0, 0x77d, [{0x2, 0x3, 0x9}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x33c, [{0x2, 0x4, 0x5}, {0x3, 0x0, 0x6cfb}, {0xb, 0x5, 0x57bd}, {0x1, 0x2, 0x200}, {0x3, 0x3, 0x3}, {0xa, 0x3, 0x9}]}]}, {0x0, [0x2e]}}, &(0x7f0000000540)=""/165, 0x87, 0xa5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x2b, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x70) 13:35:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1061.072968] Node 0 active_anon:706800kB inactive_anon:47660kB active_file:42148kB inactive_file:47240kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237992kB dirty:1356kB writeback:0kB shmem:47888kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 13:35:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000240)={0x0, 0xbba8, 0x0, {0x0, 0x7fff}, {}, @period={0x2d, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0x3f}, 0x0, &(0x7f0000000200)}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x99) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) [ 1061.237244] DMA32 free:2924316kB min:4792kB low:7868kB high:10944kB active_anon:94912kB inactive_anon:0kB active_file:2028kB inactive_file:928kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:4288kB pagetables:13528kB bounce:0kB free_pcp:1276kB local_pcp:648kB free_cma:0kB [ 1061.273438] lowmem_reserve[]: 0 3437 3437 [ 1061.293654] Normal free:2176044kB min:5480kB low:9000kB high:12520kB active_anon:611752kB inactive_anon:65896kB active_file:40140kB inactive_file:46284kB unevictable:0kB writepending:1356kB present:4718592kB managed:3521548kB mlocked:0kB kernel_stack:9920kB pagetables:20048kB bounce:0kB free_pcp:936kB local_pcp:308kB free_cma:0kB [ 1061.334028] lowmem_reserve[]: 0 0 0 [ 1061.344680] DMA32: 11365*4kB (UME) 5431*8kB (UME) 3597*16kB (UME) 3308*32kB (UME) 1876*64kB (UME) 775*128kB (UME) 379*256kB (UME) 189*512kB (UM) 136*1024kB (UME) 75*2048kB (M) 480*4096kB (UM) = 2924316kB [ 1061.370757] Normal: 490*4kB (UE) 3400*8kB (UME) 11410*16kB (UME) 8499*32kB (UME) 5599*64kB (UME) 2786*128kB (UME) 1240*256kB (UME) 493*512kB (UM) 166*1024kB (UM) 34*2048kB (UM) 41*4096kB (M) = 2176040kB [ 1061.408102] 37672 total pagecache pages [ 1061.426353] 0 pages in swap cache [ 1061.447859] Swap cache stats: add 0, delete 0, find 0/0 13:35:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) unshare(0x20020000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r1, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1061.476594] Free swap = 0kB [ 1061.492673] Total swap = 0kB [ 1061.504916] 1965979 pages RAM [ 1061.520869] 0 pages HighMem/MovableOnly [ 1061.548301] 315674 pages reserved [ 1061.567933] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 1061.600542] CPU: 0 PID: 17532 Comm: syz-executor.5 Not tainted 4.14.154+ #0 [ 1061.607703] Call Trace: [ 1061.610305] dump_stack+0xe5/0x154 [ 1061.613868] warn_alloc.cold+0x91/0x1ab [ 1061.617859] ? zone_watermark_ok_safe+0x260/0x260 [ 1061.622713] ? lock_downgrade+0x630/0x630 [ 1061.626880] ? lock_acquire+0x12b/0x360 [ 1061.630875] ? check_preemption_disabled+0x35/0x1f0 [ 1061.635917] ? avc_has_perm+0x1b7/0x350 [ 1061.639908] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 1061.644588] ? drop_futex_key_refs.isra.0+0x17/0xb0 [ 1061.649630] __vmalloc_node_range+0x3b5/0x6d0 [ 1061.654148] ? trace_hardirqs_on+0x10/0x10 [ 1061.658391] ? check_preemption_disabled+0x35/0x1f0 [ 1061.663417] ? sel_write_load+0x199/0xfb0 [ 1061.667582] vmalloc+0x60/0x80 [ 1061.670791] ? sel_write_load+0x199/0xfb0 [ 1061.674952] sel_write_load+0x199/0xfb0 [ 1061.678954] ? sel_read_bool+0x240/0x240 [ 1061.683030] ? trace_hardirqs_on+0x10/0x10 [ 1061.687276] ? check_preemption_disabled+0x35/0x1f0 [ 1061.692318] __vfs_write+0xf9/0x5a0 [ 1061.696473] ? sel_read_bool+0x240/0x240 [ 1061.700546] ? HARDIRQ_verbose+0x10/0x10 [ 1061.704619] ? kernel_read+0x110/0x110 [ 1061.708535] ? check_preemption_disabled+0x35/0x1f0 [ 1061.714631] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1061.720203] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1061.725249] vfs_write+0x17f/0x4d0 [ 1061.728838] SyS_write+0x102/0x250 [ 1061.732395] ? SyS_read+0x250/0x250 [ 1061.736036] ? do_clock_gettime+0xd0/0xd0 [ 1061.740206] ? do_syscall_64+0x43/0x520 [ 1061.744193] ? SyS_read+0x250/0x250 [ 1061.747835] do_syscall_64+0x19b/0x520 [ 1061.751833] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1061.757029] RIP: 0033:0x45a659 [ 1061.760220] RSP: 002b:00007f8a845e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1061.768145] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a659 [ 1061.775422] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1061.782881] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 1061.790160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a845e46d4 [ 1061.797436] R13: 00000000004cb08b R14: 00000000004e3600 R15: 00000000ffffffff [ 1061.861502] Mem-Info: [ 1061.864061] active_anon:176566 inactive_anon:49 isolated_anon:0 [ 1061.864061] active_file:10542 inactive_file:11803 isolated_file:0 [ 1061.864061] unevictable:0 dirty:339 writeback:0 unstable:0 [ 1061.864061] slab_reclaimable:8933 slab_unreclaimable:68777 [ 1061.864061] mapped:59464 shmem:48 pagetables:8357 bounce:0 [ 1061.864061] free:1291658 free_pcp:538 free_cma:0 [ 1061.916612] Node 0 active_anon:706264kB inactive_anon:196kB active_file:42168kB inactive_file:47212kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237756kB dirty:1356kB writeback:0kB shmem:192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1061.950204] DMA32 free:2924316kB min:4792kB low:7868kB high:10944kB active_anon:94912kB inactive_anon:0kB active_file:2028kB inactive_file:928kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:4288kB pagetables:13528kB bounce:0kB free_pcp:1276kB local_pcp:628kB free_cma:0kB [ 1062.007079] lowmem_reserve[]: 0 3437 3437 [ 1062.012696] Normal free:2242856kB min:5480kB low:9000kB high:12520kB active_anon:611252kB inactive_anon:196kB active_file:40140kB inactive_file:46284kB unevictable:0kB writepending:1356kB present:4718592kB managed:3521548kB mlocked:0kB kernel_stack:9568kB pagetables:19752kB bounce:0kB free_pcp:1272kB local_pcp:568kB free_cma:0kB [ 1062.043842] lowmem_reserve[]: 0 0 0 [ 1062.048750] DMA32: 11365*4kB (UME) 5431*8kB (UME) 3597*16kB (UME) 3308*32kB (UME) 1876*64kB (UME) 775*128kB (UME) 379*256kB (UME) 189*512kB (UM) 136*1024kB (UME) 75*2048kB (M) 480*4096kB (UM) = 2924316kB [ 1062.068467] Normal: 700*4kB (UME) 11576*8kB (UME) 11410*16kB (UME) 8518*32kB (UME) 5599*64kB (UME) 2786*128kB (UME) 1240*256kB (UME) 493*512kB (UM) 166*1024kB (UM) 34*2048kB (UM) 41*4096kB (M) = 2242896kB [ 1062.088868] 22351 total pagecache pages [ 1062.093987] 0 pages in swap cache [ 1062.098684] Swap cache stats: add 0, delete 0, find 0/0 [ 1062.105430] Free swap = 0kB [ 1062.109584] Total swap = 0kB [ 1062.115954] 1965979 pages RAM [ 1062.119499] 0 pages HighMem/MovableOnly 13:35:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000002c0)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@bcast, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)="eeafb28a01969548cf617fc220a2a70c921b43790bc00f5434fd9751e3068754b17419cc1413886b8905e8574b6c0b106e793ad76cf271b7a666384fcb5dc0f28db60c96eb0ee86065901247ad00882de44ad7ef56c4f537bb3dd546cc25fa4317fa72283c5e063fd09081fdf7492eebf61a27896d992fb1432fc6e5c26876994949c46afb06195c3319ab9bcf46ee020b6024253d9b804a2186838aaf50acfc160b822d389dc41f5e98a383334fa0d7e181", 0xb2}, {&(0x7f00000001c0)="30f3f6e89e7570cb", 0x8}, {&(0x7f0000000540)="3961109d06bb80d9978536e7783d4b3d066428774ec253bbfdd831245dd1c689bd2c7b402e4fe6ad224b85ec04c49ac4085233c4156c00daacb91947258f9d74f7d2a60436238723d531273c6424548b83d3c39a94e0ab2d9f61ef360536d40b97ec90e9baef999f8371dac5e757370024f05c1b4571cf6104f96d5f7cd0a5937cce1105fb9a5416966b4d0641e0", 0x8e}, {&(0x7f0000000600)="47056b833e4f8486f42babd9fdc3b5591eb1c254b1e157f0d4233ff07047ba3132d396912057031a0fef7e555126ad7072bc2fd5a7eeda92ddf7ea6c5c23fef11f186d1e381d1a575b1cdb71168c50f0f0357d685f080f5bf4f09d3014", 0x5d}, {&(0x7f0000000680)="53592432e19c6864082a4e4fe823daeb41d86a53a5a78248048c9a13cefc9761074251a96bad780bb6829287f92cfe503c12e50543803cb3af64c561b84ae7c28950fc30d146444ad10e6f0981c3ca3ac9e71e8647b086f2b9916e881a3b27da31caf85a14e791034d2b9dad9676529953aec1e7dae47774c32fa2bb13605446ec44d98e8ff36dace99589570e727552867850775aa965004ac5a043bc4ac7d1e2773a7986f1622e83b791743c93c5830fd1070118871fe606b64c4e810a55d19d97bd82630516548826064678c5f92e4bffe7aa198be10803673bea60619427aa492921465f9541cb2dc347", 0xec}], 0x5, &(0x7f0000000800)=[{0x10, 0x102, 0x10001}, {0xa8, 0x4, 0x236f72d2, "8339206cf9e50622977dd41af512ca46038357ebb20fe94f038a6746e125713d58c3c7e091b65251d875fc385f75615081858ea2c2373a13150eb560f245b68899f5f0a5dded5441bea958a44b438cef4e793d992467295c4ab8a97489ebced1b4dbee7e173935a3daf8d37cb7c1cafd843a96e24fa5e78c73819c1d81c12c7328753d16b931d5994df2d37ac7864a8dbd7734561e19"}, {0x10, 0x0, 0xfff}, {0x58, 0x84, 0xa6, "aa66e7ac462680d53cbc82238da142618651ac1c0389882e4d0d5d7d78eae98b6644597a7a90da7563e30b8ff3de6238b045c3765cf6018fd16fa41f00acf8bb693942cb8b1f"}, {0x80, 0x313, 0x6, "712b2d0ae5899766f50cb6da3c3b7ce8645b73be2a448cb242a0eef25de9c9aaf955ab27895866fa92907675dd1f3cad91c46865c6ed2894f2caaf8995ea97b2d46a2764a7a2b44c69e96a365d54ae083ba42ae28443e624addf94f6fc869db0023d2b46500a7ccb3c773c6253fa3599"}, {0xd0, 0x280, 0x6, "0d44aea4d0d46efd260faf881a066b070c73647142c24691ad14bef36cb22c1b616947089141cb24bae9b078f7cfe277d38d863a15e1a08aaf721db8a41cd0f2cb7061dcdd9e03df7bdaa016a6a05657c5c1da7329ccb5d88b79b82145ac37e484bbc9c26b52c9ea71252e2263fdd1f4813b26090d9743390a0fbd76b7a3f20314d5964e9f2642bc453ee3234ebbd55251efd6db64e64d889fb4f66d4183fad83e561cfe0e970ef98889df776dbeacd661b507203329474de21bd26f"}, {0x38, 0x117, 0x7, "8ba2563ab42ad321fefd7a56b16ab162ebe1ae95860006c7928d3230ee09943b0443"}], 0x2a8}, 0x8081) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:11 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:11 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:passwd_exec_t:s0\x00', 0xfeb0, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 1062.140220] 315674 pages reserved [ 1062.262886] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 1062.313124] CPU: 1 PID: 17589 Comm: syz-executor.5 Not tainted 4.14.154+ #0 [ 1062.320295] Call Trace: [ 1062.322914] dump_stack+0xe5/0x154 [ 1062.326493] warn_alloc.cold+0x91/0x1ab [ 1062.330502] ? zone_watermark_ok_safe+0x260/0x260 [ 1062.335372] ? lock_downgrade+0x630/0x630 [ 1062.339542] ? lock_acquire+0x12b/0x360 [ 1062.343556] ? check_preemption_disabled+0x35/0x1f0 [ 1062.348627] ? avc_has_perm+0x1b7/0x350 [ 1062.352642] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 1062.357357] ? drop_futex_key_refs.isra.0+0x17/0xb0 [ 1062.362502] __vmalloc_node_range+0x3b5/0x6d0 [ 1062.367025] ? trace_hardirqs_on+0x10/0x10 [ 1062.371362] ? check_preemption_disabled+0x35/0x1f0 [ 1062.376398] ? sel_write_load+0x199/0xfb0 [ 1062.380571] vmalloc+0x60/0x80 [ 1062.383784] ? sel_write_load+0x199/0xfb0 [ 1062.387947] sel_write_load+0x199/0xfb0 [ 1062.391964] ? sel_read_bool+0x240/0x240 [ 1062.396062] ? trace_hardirqs_on+0x10/0x10 [ 1062.400321] ? check_preemption_disabled+0x35/0x1f0 [ 1062.405569] __vfs_write+0xf9/0x5a0 [ 1062.409211] ? sel_read_bool+0x240/0x240 [ 1062.413287] ? HARDIRQ_verbose+0x10/0x10 [ 1062.417365] ? kernel_read+0x110/0x110 [ 1062.421304] ? check_preemption_disabled+0x35/0x1f0 [ 1062.426352] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1062.431820] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1062.436870] vfs_write+0x17f/0x4d0 [ 1062.440453] SyS_write+0x102/0x250 [ 1062.444009] ? SyS_read+0x250/0x250 [ 1062.447650] ? do_clock_gettime+0xd0/0xd0 [ 1062.451817] ? do_syscall_64+0x43/0x520 [ 1062.455808] ? SyS_read+0x250/0x250 [ 1062.460155] do_syscall_64+0x19b/0x520 [ 1062.464078] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1062.469276] RIP: 0033:0x45a659 [ 1062.472473] RSP: 002b:00007f8a84625c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1062.480206] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a659 [ 1062.487489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1062.494779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1062.502063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a846266d4 [ 1062.509344] R13: 00000000004cb08b R14: 00000000004e3600 R15: 00000000ffffffff 13:35:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffe}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0xcc0, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000036e8d5000000010000001400000500242f09880bd320d98a61a90021c9bf", 0x0, 0x401}, 0x28) 13:35:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) unshare(0x20020000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r1, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) r1 = dup2(r0, 0xffffffffffffffff) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000002c0)={0x7, 0xffff, 0x200}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffee7}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r5, @ANYBLOB="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", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="3800000010000d0400"/20, @ANYRES32=r5, @ANYBLOB="030000000000767469000c00020008000100"/28, @ANYRES32=r5], 0x38}}, 0x0) getuid() r6 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x5}, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='io.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/50) fstat(r6, &(0x7f0000000340)) r8 = getuid() r9 = getegid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {}, [{0x2, 0x2, 0xee00}, {}, {0x2, 0x2, r8}, {}, {0x2, 0xba452896c837ae9f, 0xee00}], {0x4, 0x1}, [{0x8, 0x0, r9}, {0x8, 0x6}, {0x8, 0x1}], {0x10, 0x20c015137e0f5a63}, {0x20, 0x4}}, 0x64, 0x0) r10 = getegid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {0x1, 0x7}, [{0x2, 0x2, 0xee00}, {}, {0x2, 0x2}, {0x2, 0xba452896c837ae9f, 0xee00}], {0x4, 0x1}, [{0x8, 0x0, r10}, {0x8, 0x1}], {0x10, 0x20c015137e0f5a63}, {0x20, 0x4}}, 0x54, 0x0) r11 = getuid() r12 = getegid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={{}, {}, [{0x2, 0x2, 0xee00}, {}, {0x2, 0x2, r11}, {}, {0x2, 0xba452896c837ae9f, 0xee00}], {0x4, 0x1}, [{0x8, 0x0, r12}, {0x8, 0x6}, {0x8, 0x1}], {0x10, 0x20c015137e0f5a63}, {0x20, 0x4}}, 0x64, 0x0) getgroups(0x5, &(0x7f00000003c0)=[0xee01, r10, 0x0, r12, 0xffffffffffffffff]) 13:35:12 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) shutdown(0xffffffffffffffff, 0x3) get_thread_area(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000240)=@get={0x1, &(0x7f00000001c0), 0x100}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, &(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x406, r2) r3 = socket$key(0xf, 0x3, 0x2) accept4(r3, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000440)=0x80, 0x80c00) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x6) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0xffd8) pipe(0x0) r5 = syz_open_pts(0xffffffffffffffff, 0x141900) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f00000001c0)={0x3, 0x0, 0x3}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)=0xfffffffd, 0x4) pipe(0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000006b3b1f55c4d2e5b63c96f2291538dad9facca8aa78d0177bc43f9ec2a57947a14862fc010000009cf3b38d811a75778fc8f419cbd87b5dc6ac80082242622d379e4d76c5d457bd84e69cd3f68829855cfa1738b866dafba82b0989d45786c0e619e2ee3598b88dc2e2becaf51f649fb1be99666c5ed289c870a22a6a91bef66f946c30b01baebbe383efc9d94cc366e63af5dc0000000000000000", @ANYRES16=0x0, @ANYBLOB='\x00W'], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040000) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) 13:35:12 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:12 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:passwd_exec_t:s0\x00', 0xfeb0, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 1063.034056] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 1063.056962] CPU: 0 PID: 17608 Comm: syz-executor.5 Not tainted 4.14.154+ #0 [ 1063.064108] Call Trace: [ 1063.066708] dump_stack+0xe5/0x154 [ 1063.070270] warn_alloc.cold+0x91/0x1ab [ 1063.074258] ? zone_watermark_ok_safe+0x260/0x260 [ 1063.079124] ? lock_downgrade+0x630/0x630 [ 1063.083282] ? lock_acquire+0x12b/0x360 [ 1063.087269] ? check_preemption_disabled+0x35/0x1f0 [ 1063.092308] ? avc_has_perm+0x1b7/0x350 [ 1063.096298] ? avc_has_perm_noaudit+0x2d0/0x2d0 [ 1063.100980] ? drop_futex_key_refs.isra.0+0x17/0xb0 [ 1063.106018] __vmalloc_node_range+0x3b5/0x6d0 [ 1063.110521] ? trace_hardirqs_on+0x10/0x10 [ 1063.114755] ? check_preemption_disabled+0x35/0x1f0 [ 1063.119780] ? sel_write_load+0x199/0xfb0 [ 1063.123943] vmalloc+0x60/0x80 [ 1063.127147] ? sel_write_load+0x199/0xfb0 [ 1063.131302] sel_write_load+0x199/0xfb0 [ 1063.135301] ? sel_read_bool+0x240/0x240 [ 1063.139387] ? trace_hardirqs_on+0x10/0x10 [ 1063.143629] ? check_preemption_disabled+0x35/0x1f0 [ 1063.148670] __vfs_write+0xf9/0x5a0 [ 1063.152305] ? sel_read_bool+0x240/0x240 [ 1063.156376] ? HARDIRQ_verbose+0x10/0x10 [ 1063.160447] ? kernel_read+0x110/0x110 [ 1063.164376] ? check_preemption_disabled+0x35/0x1f0 [ 1063.169413] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1063.174871] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1063.179907] vfs_write+0x17f/0x4d0 [ 1063.183468] SyS_write+0x102/0x250 [ 1063.187055] ? SyS_read+0x250/0x250 [ 1063.190694] ? do_clock_gettime+0xd0/0xd0 [ 1063.194851] ? do_syscall_64+0x43/0x520 [ 1063.198835] ? SyS_read+0x250/0x250 [ 1063.202475] do_syscall_64+0x19b/0x520 [ 1063.206393] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1063.211587] RIP: 0033:0x45a659 [ 1063.214772] RSP: 002b:00007f8a84625c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1063.222487] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a659 13:35:12 executing program 2: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='system.posix_acl_ \x87cess\x00\xa1\'0x0}) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000780)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r5) sendmsg$unix(r5, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000b00)=0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r7, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r7, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x10010000000036) r9 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004700)=0x0) r12 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r13) stat(&(0x7f0000004740)='./file0/file0\x00', &(0x7f0000004780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = gettid() ptrace$setopts(0x4206, r15, 0x0, 0x0) tkill(r15, 0x10010000000036) r16 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r16, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r16, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r16, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r16, 0x0, 0x10, &(0x7f0000004800)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@empty}}, &(0x7f0000004900)=0xe8) r18 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r18, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r18, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r18, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r18, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000004940)={0x0, 0x0, 0x0}, &(0x7f0000004980)=0xc) sendmsg$netlink(r1, &(0x7f0000004a00)={&(0x7f0000000340), 0xc, &(0x7f0000004680)=[{&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="c8d431fadc03b50905b864e180af1d2d4644d7c7b89bdeb351cb3445ef193069ae4ce4b8ed51a9bc66d0a02145b9c3de0b839ee77e56dadcd44c5707a47add7b75254ea35654739199ddb1a2c8fcfa0e0897c0678497fb7de35ce7aed9de00000000"], 0x240}, {&(0x7f00000007c0)={0x310, 0x2f, 0x400, 0x70bd25, 0x25dfdbff, "", [@nested={0x84, 0x1b, [@typed={0xc, 0x83, @u64=0x4}, @typed={0x8, 0x91, @uid=r3}, @generic="d4aecb86af06dcbb215b8d6738bd72e638777a1baa675600fb1629255d439f3ae908321eea37e23a87d2c4f06db7f0b3e2e546d18c999145052f49c9b438bd8e4e4612b54ea7e45197e4146f8790fae113b568a26181d6fe5540a18d8c2ca07cc30d567915bb574dbf"]}, @nested={0x274, 0x13, [@generic="a8bfe98d9e37224d6562bf3893b30b7ee187ac3483da6d50325357626f49fa856751dc6856327798b6b88cd204c4ccbf14ce48eff76c2b6931fba01476b62df217cb3b7b1a4dada849c8155fbe12c8926a9b20003aa4b247f7359f818b1cc4cc73139d61b7def30417e072bd8bd264f68a22af3bd35a4501b9d0f7e81141a6fd664fc56a39549f0fcf", @generic="d218ef1e17593828793e1064c66262d0ec46dc09eeb57c6069eed5eb2f74bd24524376704198ed142a1d4d18209a75ae7bec95c0654f9f503a19e6a860db21ce31c1dc762a524df100f95ed3981e2d159019995a", @generic="839dc980e6fe8c148a7344dd3cf1da580b2bd2a296ba8cdfb099aca9d120bf90bd86514f7293f9dd984c69561f131c7334cbed148ad32afff7d39c346e494a6356edb642265ad74edac57e69fd9e51dea6f8b9430ca2a92334e362a11fb589eb0cdc5535ff9a2bd8a4c97fbce656f84beb984793f2801081b13d726494c7af8a3931a452ff2bb023f12b4782946c9459562595e976a2fe5fc99867a6b04e92c62a184ed06b4f5d", @generic="a2db84af0917c265475c37d036daa54f50fb4b06c63317127c87a4f33736d72677f841c2d3322d909669338acc62cd1d8efad95cf3c2c0094a58fc266cb98e9eaadd63723e6cec90bc093a940a3f85b4051373f17fa22f4570256f", @generic="02c45ba0496166f0c8df2a31b9a470724c01ed6087a348da542255f8ffd959c7c9b9cccb930803f9188f4a41bc2a84adc07d923ae3b9a561796414b7c9c290b84d3de65182152d9cfb3b0125c9b654b9618f2e20cb7f744f33e69946cf384226e7423adbb7db0dd6aaa05b4d92853bc9d5afd20965a64086ea23bb95f9543f49146549f0451c73", @typed={0x8, 0x3f, @fd=r4}]}, @typed={0x8, 0x3a, @uid=0xee01}]}, 0x310}, {&(0x7f0000000b40)={0x3d4, 0x37, 0x700, 0x70bd2a, 0x25dfdbff, "", [@generic="93b8c1f4ea446b555f35ea0b839b8113fd8aed9f818584fb0c2e951a4f4c11cc1e54cad045a843b338a8a54130ccd890a25e129da3242bcd2aa71c6e56d4ebd2fe4b7448a0658effdec65ab6b515602d6195c58f775ea220915c05716f6d189a4e0842b64e8d30e2a754343276f2a2984b53de825a09653506976272c3e84fe8f0a64966d740dbb8bdb139c4bbe82355cade2ca66d6a12a5d77f7b068930005c18f3bf93eb0bfc766bca5cfbefcee08c63d4163f05f11d811a7552d83745682354371db099b73a8f80cad0c455c44e5ca15dd812a3236a3bc5ef", @nested={0x74, 0x23, [@typed={0x8, 0x5f, @pid=r6}, @typed={0x14, 0x5e, @ipv6=@rand_addr="617e1c1c9cc427c4a3db61236f433b48"}, @generic="01", @generic="1ada587715235e0e15ea43fa0b8c996f2af28e9b3e750eb8bbb27465e2a833656df61552199ca2d1f044b52142e8a42363209d7c5a01156ff65c5c66d580cd93a015", @typed={0x8, 0x18, @ipv4=@empty}, @typed={0x8, 0x5, @ipv4=@empty}]}, @typed={0x4, 0x70}, @generic="2b333dbc8c68cfd9f84d73093476b2180e22796eeed21e4caf6a91bca72baa988fb1bc328e78e9ce98deaa0e57c8b1e143693479e855cf8e562b10aec514af6bf23e37624860a66b", @nested={0x228, 0x1, [@typed={0x8, 0x47, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="caf175397f5613d0d291ded3f07464371f2ed0d7552b3fcbccc110da32d7c81b430dab3a2bf905fb64e52a2cb2852d8efc06133713aecf96183b14f9ff75777f8efaa2164073676c42b71292f02737cce128b4b3da74b58076a3e92dd0c37b666bbee50548678369794a7b13e8fedf7bb80319ae45f9b6bc6f053106905e0bec0b2cf5fe01b41d502085c66e41371a1e21155b367a85d33bcb014f5bcbb7f5", @generic="9b903ce2658a0191b4eff6b5ebf51a85586d5358fb2db55faf316b343a93c9bcdf8d797b0e33fd8af79d45966239df287196c8615e8f0220aa11d1167447cef25a40ed0845361e1c6b04d59b79db30aa428c45f42bc181406095edbee8a86ece5332b0c7f007dc99d1e954259a29eb4a6ff1212f3b92bcce087f0937b76dc9b3bbc3b0c68e879ee5e90fa4a4e1db31d69b4e7d631efee882f10cec426a108cc171d1fe8dfb92b89bec4983b83631519a6bdbfc61f6633d766f42", @generic="1cd6c75063109dd53880f8d9786ffc4e997fa7bcc0eddbd9187727010df64a7dfb9754c84072e9d518dfdf486d4f4f500dedb5cb3818db0d956644e3d4832b7b1429adaeca616c136e79411008177e2c", @typed={0x8, 0x59, @fd=r7}, @generic="1fb6e56006d49b2fb4c37a7b57b98ab4a87acd0b66b63beb5652e0c2c4aaae71f34df3d8d1e92138bb678b3c97a4b4624f26bd53595d420325d9eaa1d435dd9b9da4074d9e9c26ececea722f656067a79ed45c3461ff45260e8fab39ccec55aa04eba98f5ea432e78225f4"]}]}, 0x3d4}, {&(0x7f0000000f40)={0xc4, 0x18, 0x200, 0x70bd25, 0x25dfdbfb, "", [@typed={0x8, 0x62, @pid=r8}, @generic="456dde7e72ebeacb4a73d7b6204ecea4b0f994052be36c0a068583994b8dae16ff338389a2daae4564a85d7364d5630d5e87d6440240baf374ed537ec5845e11b3ae8056180c2d236bdb517b691c1f927d8358b077075b8cb34edf84e74f3987361d7607d35b2548cdda5a88c33e6ac98e28ea26ab09d024d668f03c80a554b90525d7115b1c89d5f823986adcf53959e3a6a94925c21358133b0696c8da132b4c9471bd7e9dad0952"]}, 0xc4}, {&(0x7f0000001040)={0x21cc, 0x1d, 0xb6397df8a489b702, 0x70bd29, 0x25dfdbfd, "", [@nested={0x2084, 0x8c, [@generic="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", @generic="372490072ef8ba157d7dcfe76f80dd311aa81d1d395382b66e446d60196d3f198eaed915fa69d683a5a24409a9afe173c3f4120d53f8fb43e9498a1e97cba8e60056c8d408e0c656687423f92b0594331c5137507ec96d36cc130caf3c593b6981a0944a32d18a94ef754772d3a982dffb8b7c99fd8f5c", @generic="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", @typed={0x8, 0x2e, @u32=0xffff}]}, @generic="207a87a701ad1e51f36bbfbff399493461331576faaa4292166a84b1e9cc5b74728d14a2482851e08270d1dab06c9604d3389474af5ee69c7fcca3641916401803bec256af3c14ab4e0ad791ff86d7dfcfc0a592a9c07e4ca8a21eca2987e3bca9c61083f4dc3708d6af610d75c6abb437bea796c1a6596533e6236076bd1f3c09302804ad6afc482f71816ff7d2772351be03e811716f0a75159a75abf29a3049b1dd64a75e9497bdb0da3a9ebcdfee6e342363fb2b36350c4e72a5a4808c9b901751", @generic="7ee11e45d7ff54eb8f8e3d41b75dea07ffd217bbd688bb2da2fd825a09a58aee3ad7c3c61bb60963a4f3aa3becf3b4", @generic="e36d640d221b45cc6303df4ce2ca57b6c10533042350da31c293dc1a1ca97a4538c69d0bb433504739523e9d88f1af6206756ad3b3ce26e12d33b98e", @typed={0x8, 0x55, @uid=r10}]}, 0x21cc}, {&(0x7f0000003240)={0x1224, 0x17, 0x200, 0x70bd26, 0x25dfdbfb, "", [@nested={0x214, 0x42, [@typed={0x14, 0x14, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, @generic="f38e3777618b873052a4ee7fcd9cd79daf524b48ea07487c879357d2d59cd4cd2d7fa9bab8e6f51312a6ad4705fa35a3c0717de792cba57f1e80581c58f9b12d02203a1abe167278b92b89243ffd9d7728296730206d6239f975489fc559e9152f01c4427f819a5fbb53db51fc5faef92c76df7f33a203b27f5d73a96104b08da9c60124264a971ff1b1ff70fb48361f124aff8226336405a69ddf5156c21c8ad850961295b3603eaed5ec937a8a302df7668f", @generic="8deabab2951762918bd25a12a7e747f778300b8e1a5bc33b4fb364fae5f39e5bd4c05d018e5efd8e7c8dfb3a4fee67a5938bb9d4b84ad2dd95207baa287d7d65a8efbc53b54bede8b4a04743b3216fe53fa75b25aa9ac260feb104e49842397e944379938d08e694a070aaeb4217a55fc0b3ec54962d1d2f6aa9912d74351052493f09987d57431b54a8fc24a700e2caad98e011192fa36d5e88275691645f2018cc6f426698926bf05dd5fedb80125ed66ce7c24942eec93d0e38e1e4f0e9deaf2889e30d6637b24f06", @generic="de052f73a68a0707fa878ec35371daa0e9dad077da94d8fa047201035d4e9934a00a42a9883dfc1dc43fb4fc3903f97b13e65cf9299126baabd8df8778d4180324bc31aa995a1d565a65e79f2f3f722a6de382bcea66c785d21b8a7334296f86d9caf66ee1ab4b8ec16696f648bff0205b00f4a4754cc0f33adae63e89"]}, @generic="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"]}, 0x1224}, {&(0x7f0000004480)={0x1a8, 0x3c, 0x45ee71af1f6958e5, 0x70bd27, 0x25dfdbfb, "", [@generic="2ec5e8b0929f1d5d82f790ce41a08c8e3c5333cc87be26811ceacd0929e0a27c1577cf66e9e1ded13112500990e72ce4b897b124e3dfe3901f4d05ab327a32040e2338f56ce76f3542b05b910f1dcdc01c9b2b1267163d8eb45b016b84ab9de73c36af0c4ff9", @nested={0x130, 0x38, [@typed={0x8, 0x2d, @u32=0x1}, @generic="674c1d5524c9137873a093d341769cec", @generic="fc54315460bea8930fb28e98be5715a7f2751ac306f562bab8b996b4f60c533725b862a6f4040baef4fd6b263fe2bbbd4430c059442c9a2902e210500774934ef9f5904b7f0485834791870e2fc0a9bfb9e490933fa75c1b2e6343cf61b737dfa04bbeec86462fe95195d5bd8b503fa3d31d0d0b05d02cbb653e745207ff59b3b84dee786d8527377e47b5abf7bc33c263c96bb793002c2128efaa3e2acbe794c94378c672ca60401e28bf210d55e896a54f75608c441be2e9009a4dfeddde47bcc4acb4e4169e0bea0e1b80a47be5ee45ef3301c30eba4d0d2a338fe3c2320d2a53110e90", @generic="6cb6f27b164cdf36e62251b0c043cc6f571059bfcd800c226596ddf011b928a9c43acf1414518879e3273872d9"]}]}, 0x1a8}, {&(0x7f0000004640)={0x28, 0x1b, 0x200, 0x70bd2b, 0x25dfdbfd, "", [@generic="56b508b7bb74a586be746d5b", @typed={0x8, 0x43, @u32=0x83c0}, @typed={0x4, 0x82, @str}]}, 0x28}], 0x8, &(0x7f00000049c0)=[@cred={{0x1c, 0x1, 0x2, {r11, r13, r14}}}, @cred={{0x1c, 0x1, 0x2, {r15, r17, r19}}}], 0x40, 0x10}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r20 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r20, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, {}, 0x0, 0xfffffffe, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=@v1={0x2, "0b9eb568"}, 0x5, 0x2) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) open(&(0x7f0000000300)='./file0/file0\x00', 0x0, 0x22) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:13 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) [ 1063.949208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=52736 sclass=netlink_route_socket pig=17651 comm=syz-executor.3 [ 1063.959179] Normal: 352*4kB (UME) 3382*8kB (UME) 11393*16kB (UME) 8504*32kB (UME) 5600*64kB (UME) 2786*128kB (UME) 1240*256kB (UME) 493*512kB (UM) 166*1024kB (UM) 34*2048kB (UM) 41*4096kB (M) = 2175296kB [ 1064.023038] 38939 total pagecache pages [ 1064.031130] 0 pages in swap cache [ 1064.038088] Swap cache stats: add 0, delete 0, find 0/0 [ 1064.060794] Free swap = 0kB [ 1064.073327] Total swap = 0kB [ 1064.089262] 1965979 pages RAM [ 1064.106056] 0 pages HighMem/MovableOnly 13:35:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000002c0)='./file0/bus\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000400)='./file0/bus\x00', 0x200000, 0xaad0bcf8274ff4b) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="ff5b5922af2748bc68dfab8d4c8941f94d8a4e9ef0544fec5035f31765fb918413f6"], 0x24) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f0000000180)={0x9, 0x4, {0x51, 0x40, 0xc0b, {0x200}, {0x1, 0x8}, @const={0x1000, {0xfff8, 0xa155, 0x8, 0x1c81}}}, {0x55, 0x8, 0x3ff, {0x4, 0x142}, {0x8, 0x8000}, @rumble={0x7fff, 0x6}}}) fcntl$dupfd(r3, 0x0, r3) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000380)=0x8) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1064.126111] 315674 pages reserved [ 1064.144542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=52736 sclass=netlink_route_socket pig=17651 comm=syz-executor.3 13:35:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000400)='/s\x00\x00\x00\x00\x1d\x00\x00\x00\x00s\x87\x00', 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xff) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$poke(0x1, r2, &(0x7f0000000040), 0x4) pivot_root(0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0xfc, 0x1, 0x2, "31f42c1cc22706c29a34274e5b9754c4", "7e51e8000f311eab9e670622791fa6fdf7f59105ab23d72f995627cc252b4a8c71b766631334b31d3928b1eaed8e4abda707f36926d59e2951b233ee8bd07aa21f3f8d621fff2aef84cd8ff41b963540b30e08acc12c38fbd3a5c03a5e469a5523a89c16ff37805a48b2adc63ca2ee50181592d5235ea748376f8577b4f8179f215161449994d2a903b12cb1ea9ad82943dbb96df7274aca316ceacc2a9d405d276b37ae1c7d878a951e2970aba2e210a2060b652c3b520121e8f17a6dfd0bcbe378145b01135677f199237c25af0724af211dfd17032d0b924d4426909b5ba940c19cf2a5d409"}, 0xfc, 0x1) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) fchdir(0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0xff) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x27) r4 = open(0x0, 0x0, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r5) sendmsg$unix(r5, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f0000000080)) fchdir(r4) sendmmsg(r4, &(0x7f00000092c0), 0xc6954b, 0x0) utimes(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000180)=0x1) openat$null(0xffffffffffffff9c, 0x0, 0x1, 0x0) 13:35:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r1, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:13 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x10400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0), 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) creat(0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) [ 1065.178927] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 13:35:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) write$selinux_access(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r1, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {0x80000000}, {0x0, 0x5}, 0x0, 0x0, 0x1}, {{@in=@local}, 0x0, @in=@loopback}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r1, &(0x7f00000002c0)=""/125, 0x7d) mount(0x0, 0x0, 0x0, 0x5010, 0x0) r2 = getgid() setgid(r2) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000036) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000480)=0xc) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x10010000000036) syz_open_procfs(r5, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:14 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x10400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x6) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000100)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x4a8, 0x0, 0x280, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev={[], 0x13}, @loopback, @rand_addr=0x9, 0xa9b17d0071ec8315, 0xfffffffe}}}, {{@arp={@multicast2, @remote, 0x7ffffe81, 0xff0000ff, @mac=@random="3b22f355d026", {[0x0, 0x0, 0xff, 0x0, 0xff, 0xff]}, @mac=@broadcast, {[0x0, 0xff, 0x0, 0xff, 0x0, 0x1fe]}, 0x4, 0x76b5, 0x1, 0x1, 0x9, 0x400, 'gre0\x00', 'veth0\x00', {0xff}, {}, 0x0, 0x4}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback, @multicast1, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0xd}, 0x8}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0xfffffffffffffdae) socket(0x200000000000011, 0x3, 0x0) 13:35:14 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:14 executing program 2: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000280)='system.posix_acl_ \x87cess\x00\xa1\'\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f00000001c0)=0x2, 0x4) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) [ 1065.714316] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 13:35:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:15 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) exit(0x4) r1 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x4) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) chown(&(0x7f0000000240)='./file0\x00', r3, 0xee00) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:15 executing program 5: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x10400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x6) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000100)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000840)={'filter\x00', 0x7, 0x4, 0x4a8, 0x0, 0x280, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev={[], 0x13}, @loopback, @rand_addr=0x9, 0xa9b17d0071ec8315, 0xfffffffe}}}, {{@arp={@multicast2, @remote, 0x7ffffe81, 0xff0000ff, @mac=@random="3b22f355d026", {[0x0, 0x0, 0xff, 0x0, 0xff, 0xff]}, @mac=@broadcast, {[0x0, 0xff, 0x0, 0xff, 0x0, 0x1fe]}, 0x4, 0x76b5, 0x1, 0x1, 0x9, 0x400, 'gre0\x00', 'veth0\x00', {0xff}, {}, 0x0, 0x4}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback, @multicast1, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@broadcast, @loopback, @dev={0xac, 0x14, 0x14, 0xd}, 0x8}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0xfffffffffffffdae) socket(0x200000000000011, 0x3, 0x0) 13:35:15 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:16 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f00000001c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) link(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000340)='./file0\x00') syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000faffffffff040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000078560391000000000000000000010000000000000000000000000000000000000000000000008983763afc5d4cbded8049966244878bfd37d8fd8be97a2eb642884d2238e82c3c70c63a66dda106946f768629bb9e36af873865eadaedd40525a62d519eec8b0f376e3a179b86cf8d4f5212721bb92b4ac8ad28559159a80c3c8525200b8f1207e5f60547f9436977b9c16797239e6d20b8417bdef2a3fbf6d4bf1bd206bf040087bf6c6e3d8c4fa8b5652259f8c016c6df81c4d5f4c288f238078bc08db5b3f27273c703d2796eaee03a7b819cca8aa9b52377312c1a8f623e3408b88ab666e575958a8dfd97eb850abacfbbf460f0beef5c3519ef639d7eca9065594968b1ecb333be778d9e0ce2d5dccdbfa56e85ee02db96fb31e092f9acc67fee0437bac135fe9a0b7edf5b042065ccb65acdb58279cc042a91f4411dd96fd9b28ed8f5ba6822279e19dc80078a4c9e748697c859438f62d5632e34a112a4715615a96401d798724fa8f339b2559a1d18c7b5b6c1167a"], 0x78) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:16 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_evm(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f00000002c0)=@sha1={0x1, "c0b780d65af81aac56ffc988a6cb0f0521564a25"}, 0x15, 0x1) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x5002) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000000)='\'', 0x1}], 0x1, 0x1081809) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f00000000c0)="174053f1b9f96ba8e76995567576f6c45de2f985830ce8f4103684c5ff147d0b6c30c70cec1ff01fb7880f863cbdcc72dcf8104c81d81291c805c5cb8078ab69740fb74a50140ca5488b9c9c7673b12e386e01e9dcb5b4bb9f4898fee2e0cce7f222e26c52526925dcd1631df8d10d033655a53b162c9b6a2200244c6f58635f6f42a9ba8864769b8b2c94da6dbb23820c6aea6396aabca3aaee676358a6908ef98244dc711fa40742bf54e68233ead2", 0xb0, 0x40000, &(0x7f0000000040)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000009) 13:35:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) mount(&(0x7f0000000100)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', &(0x7f0000000180)='affs\x00', 0x3002820, &(0x7f00000001c0)='keyring\x00') fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="ffd934aa54cdfc17009c5b726f13012f66b000000000e00200ffbf1f86c04d7e8ccf112d7baa01e025af2ac3e1b68af96a5ebae9540000d6ee4398d0dfeb32088b72de80c7514eebc17b57bdc6b113edb3108ed13fcc29bed1a4b40e6dc3a386579c0968845249ffcb628bb367480619795e1309b14d709237b73cfc0a7ebabb89f54309085ccce29054992e982d7d1f6d19826d01e6722d005d383888ea2e03074424347e3f419f9232256d6883f4eaa2d52b29e6538dcf690cd6c097b5125894289bfb3a3f5b167d242325f272a30db14c"], 0xd2) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) readv(0xffffffffffffffff, 0x0, 0x0) 13:35:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 3: sendto(0xffffffffffffffff, &(0x7f0000000140)="120000001600e70d017b00000000008e1584", 0x28f, 0x0, 0x0, 0x3d4) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000180)=0xffff) getrusage(0x0, &(0x7f0000000080)) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f601000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000000fa0000000060000000000009a1e5"], 0x2ab) 13:35:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) unshare(0x10000100) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='syz_tun\x00') 13:35:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='bpf\x00', 0x2e20402, &(0x7f0000000480)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x12b}}, {@mode={'mode', 0x3d, 0x8c}}, {@mode={'mode', 0x3d, 0x6b}}, {@mode={'mode', 0x3d, 0xf1a1}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x10001}}, {@mode={'mode'}}], [{@context={'context', 0x3d, 'root'}}, {@subj_user={'subj_user'}}, {@fsname={'fsname', 0x3d, 'lonodev\x96$keyring'}}, {@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, '$posix_acl_access&'}}]}) 13:35:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:21 executing program 3: getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'nat\x00'}, &(0x7f0000000040)=0x54) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="100000000000000006b9650501000000"], 0x10}, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000003c0)=0x1) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000100)={@mcast1}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x25, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/297], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r3 = dup3(r2, 0xffffffffffffffff, 0x80000) write$P9_RLOPEN(r3, &(0x7f0000000400)={0x18, 0xd, 0x2, {{0x19, 0x1, 0x4}, 0x8f3}}, 0x18) 13:35:21 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:21 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:21 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r1, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x33}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffeffffffffffc}, {0x0, 0x3}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000002c0)={0xff, 0x1}) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r2) sendmsg$unix(r2, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r2, 0x14}, 0x10) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:21 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:21 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:22 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000480)={0x3}) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_adj\x00') openat(r2, &(0x7f0000000240)='./file0\x00', 0x8202, 0x48) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f00000002c0)=@sr0='/dev/sr0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='ext3\x00', 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:22 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r1, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:22 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:22 executing program 3: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="a0de925b34dcb7c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3009f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d1239bf00644868dd927f34ca15bb4c70f5c4677f30ed8c8d8c7513f1209217d2ac1c60455a77c9545f12a29c882cc2fb5eef125c03e7137b74cca03b0b2c2c9e3f856f0cee1389") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x7fff, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140), 0x80000) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_CAPBSET_READ(0x17, 0x1a) fcntl$setpipe(r3, 0x407, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89b0, &(0x7f0000000080)='ip6tnl0\x00') r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPC\xad\x83\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e04a08cb", @ANYRES16=r4], 0x2}, 0x1, 0x0, 0x0, 0x4c081}, 0x0) r5 = getpid() ptrace(0xffffffffffffffff, r5) sched_setattr(r5, &(0x7f0000000440)={0x30, 0x6, 0x0, 0x8e, 0x100, 0x58, 0x1}, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r6) sendmsg$unix(r6, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$EVIOCGVERSION(r6, 0x80044501, &(0x7f0000000300)=""/58) socket$inet6(0xa, 0x80002, 0x0) r7 = socket(0x10, 0x2, 0x0) write(r7, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r7, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa00, 0x0) 13:35:22 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x140, 0x0, 0x4, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x400, 0x1f, 0x4, 0x9}, {0x6, 0x2, 0x6, 0x1}, {0x20, 0x4, 0x8}]}) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000380)) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000500)='ext3\x00', &(0x7f0000000540)='./file0\x00', 0x15d40426, 0x1, &(0x7f0000000600)=[{&(0x7f0000000580)="889db9742fefab76cc8b0361e12a22a248a103ea642a67cfe6dbf5234915bbcb73b7ede80c2880aeebbb9a8bb90348b339a7e18be4645f775f1756badede74da55c1379bfee7579e4e8557fced4b812a14238e76531a6d01d5a75cc9a373c87f44b85a", 0x63, 0x1d}], 0x80, &(0x7f0000000640)=ANY=[@ANYBLOB="6d696e697855662c696e69745f697461626c652c6c617a7974696d652c73623d1278303030303030303030303030303032302c686173682c00"]) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000002c0)={{0x1, 0x2, 0x5, 0x0, 0x5a}, 0x600, 0x4}) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = accept(r1, &(0x7f0000000180)=@caif, &(0x7f0000000200)=0x80) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000240)={{0xa, 0x4e20, 0x24, @loopback, 0x3}, {0xa, 0x4e22, 0x80, @local, 0xb2d}, 0x58a7, [0x7, 0x0, 0x1, 0x401, 0x8, 0x2, 0x0, 0xaf6]}, 0x5c) 13:35:22 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r2 = dup(r0) sendmsg$key(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020702007f00000000000000fe800000000000000000000000b26b6e000300000006003c00802000000100000000000000000000000000000000000000ff02000000000000000000000000000100"/100], 0x68}}, 0x8800) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600)={'#! ', './file1', [{0x20, 'vboxnet0}'}, {0x20, ','}], 0xa, "7b44705af567db156865ba198d03fdd61f066a1af0e7a275a2f454105044ec6f45159405b705ccff8d9499e6bb29c4d911e87dbf1bb903fd5010c257"}, 0x53) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r3) sendmsg$unix(r3, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000480)=""/11) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000000240), 0x4) clone(0x20000, &(0x7f00000004c0)="55f0dc2e6e972a32644e56595e3ce2ed8cc4aa7a7d88fc3595807172863194af75d9776d1577d2", &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="69b7d4cd51023d3ba220aff9c17f562cb27358962adf9b933058b8a88b2b56751cc79249f92372ed82f9204eecb697bdfc81fe412e5e835d8bf77f5f4fa995e6e2e193fcb9ce5e523a3518dddd906a0bc19b55") syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:22 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:22 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r1, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') [ 1073.265995] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1073.403761] audit: type=1326 audit(1573738522.560:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d49a code=0x50000 [ 1073.499234] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1073.508068] audit: type=1326 audit(1573738522.600:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a659 code=0x50000 [ 1073.544757] audit: type=1326 audit(1573738522.610:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d49a code=0x50000 [ 1073.584162] audit: type=1326 audit(1573738522.610:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x45a659 code=0x50000 [ 1073.609039] audit: type=1326 audit(1573738522.610:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d49a code=0x50000 [ 1073.634646] audit: type=1326 audit(1573738522.610:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a659 code=0x50000 [ 1073.661897] audit: type=1326 audit(1573738522.610:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a659 code=0x50000 [ 1073.692542] audit: type=1326 audit(1573738522.610:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a659 code=0x50000 [ 1073.717907] audit: type=1326 audit(1573738522.610:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a659 code=0x50000 [ 1073.774577] audit: type=1326 audit(1573738522.610:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=18215 comm="syz-executor.5" exe="/root/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a659 code=0x50000 13:35:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 3: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="a0de925b34dcb7c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3009f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d1239bf00644868dd927f34ca15bb4c70f5c4677f30ed8c8d8c7513f1209217d2ac1c60455a77c9545f12a29c882cc2fb5eef125c03e7137b74cca03b0b2c2c9e3f856f0cee1389") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x7fff, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140), 0x80000) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_CAPBSET_READ(0x17, 0x1a) fcntl$setpipe(r3, 0x407, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89b0, &(0x7f0000000080)='ip6tnl0\x00') r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPC\xad\x83\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e04a08cb", @ANYRES16=r4], 0x2}, 0x1, 0x0, 0x0, 0x4c081}, 0x0) r5 = getpid() ptrace(0xffffffffffffffff, r5) sched_setattr(r5, &(0x7f0000000440)={0x30, 0x6, 0x0, 0x8e, 0x100, 0x58, 0x1}, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r6) sendmsg$unix(r6, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$EVIOCGVERSION(r6, 0x80044501, &(0x7f0000000300)=""/58) socket$inet6(0xa, 0x80002, 0x0) r7 = socket(0x10, 0x2, 0x0) write(r7, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r7, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa00, 0x0) 13:35:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x4, 0x70, 0x40, 0x35, 0x6, 0x5, 0x0, 0x9, 0x20, 0x10, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x4210, 0x1000, 0x73, 0x5, 0x0, 0x1ff, 0x9}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:23 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in=@loopback, 0x4d4, 0xff}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:23 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) personality(0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x2) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:24 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:24 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mlock(&(0x7f0000ff1000/0xd000)=nil, 0xd000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) munlockall() 13:35:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x100000001) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, {0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in=@loopback, 0x4d6}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:24 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:24 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:24 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:25 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:25 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:25 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:25 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:25 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000001c0)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:25 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:26 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:26 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\"\x00', @in6=@local}, {}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in=@rand_addr=0x980}, 0x2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000001c0)=@req={0x8, 0x1544, 0x4, 0x2}, 0x10) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:26 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) bind$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff21) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x25d) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) syz_open_procfs(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) getpgrp(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x10010000000036) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000140)=r3) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0xff53) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 13:35:26 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) [ 1077.088868] print_req_error: I/O error, dev loop0, sector 0 13:35:26 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:26 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:26 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x490, 0x140, 0x0, 0x0, 0x3a8, 0x3a8, 0x3a8, 0x4, &(0x7f0000000240), {[{{@arp={@remote, @multicast2, 0xffffffff, 0xffffffff, @empty, {[0xff, 0x0, 0xff, 0x0, 0x1a8c9ae6d68cdb27]}, @empty, {[0xff, 0xff, 0x7f, 0x0, 0xff]}, 0x5ea9, 0x6, 0x7, 0x6, 0x6, 0x251, 'vxcan1\x00', 'eql\x00', {0x7f}, {}, 0x0, 0x200}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev={0xac, 0x14, 0x14, 0x10}, @remote, 0x2}}}, {{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x2, 0x6}}}, {{@arp={@remote, @loopback, 0x7f8000ff, 0xffffff00, @mac=@dev={[], 0x13}, {[0x0, 0xff, 0x0, 0x0, 0xff]}, @mac, {[0xff, 0xff, 0xff]}, 0x401, 0x9, 0x8, 0x2, 0x20, 0x9, 'nr0\x00', 'team_slave_0\x00', {}, {0x40768503c41b1caa}, 0x0, 0x200}, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x6, 0x1, 0x10001}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e0) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) r2 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1, 0x3}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:26 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:26 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) chroot(&(0x7f0000000080)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) mount(0x0, 0x0, 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f00000000c0)='\x00', 0x1) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000280)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r1) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000001c0)={0x20}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) 13:35:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:27 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:27 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:27 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 13:35:27 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:27 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000300)='./file0\x00', 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4acf11812b074664, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x65ea) socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000016c0)={0x1, 0x7}, 0x8) r4 = socket$inet6(0xa, 0x3, 0x6) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpeername$packet(r5, &(0x7f0000000080), &(0x7f0000000100)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) sendto$inet6(r4, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 13:35:27 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) fdatasync(r2) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000003c0)=0x0) fcntl$setstatus(r3, 0x4, 0x44800) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000000)='-\x00') r5 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r6 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r6) sendmsg$unix(r6, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) write$P9_RWALK(r6, &(0x7f00000001c0)={0x3d, 0x6f, 0x1, {0x4, [{0x28}, {0x2, 0x3}, {0x8}, {0xd5f7f9881aacbf50, 0x4, 0x4}]}}, 0x3d) keyctl$describe(0x6, r5, &(0x7f0000000100)=""/42, 0x2a) socket$inet6(0xa, 0x4, 0x6) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 13:35:27 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:27 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 13:35:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:27 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 13:35:27 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:28 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:29 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:29 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:29 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:29 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:29 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x11, 0x0, 0x100000001) 13:35:29 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:29 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:30 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 13:35:30 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x11, 0x0, 0x100000001) 13:35:30 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000740)={&(0x7f0000000000)={0xa, 0x4e23, 0x10000000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x0, 0x4, [], [@enc_lim={0x4, 0x1, 0x80}, @padn={0x1, 0x1, [0x0]}, @pad1, @hao={0xc9, 0x10, @remote}, @pad1, @enc_lim={0x4, 0x1, 0x3}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x2, 0x2, [], [@pad1, @hao={0xc9, 0x10, @loopback}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x44}}, @dstopts={{0xd0, 0x29, 0x37, {0x6c, 0x16, [], [@hao={0xc9, 0x10, @rand_addr="157462d82083f1e9c4e117d7f460160f"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x81, 0x7b, "3c2796892a2284bb58b4243b62dd3fdb2be165040ce89b76eb85c38b4435ead921f58a61041af228d8e437b5b98f409acedd75941b26f1fe76c7c264657e4796e4607a6360da022a1d63c2c636614e29fb2ec3904f8c3df398249d1b04e1abe1f37c32ed57ac0a15b7f88f031e70e76edb16ff1e15d60047fb8471"}, @calipso={0x7, 0x10, {0x5, 0x2, 0x7f, 0x8, [0x3f]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xe9}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x1c8}, 0x4000000) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x0) ptrace$setregset(0x4209, r5, 0x20000004, 0x0) getpgrp(r5) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getgroups(0x1, &(0x7f0000000700)=[r7]) r9 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r10, 0x0) ptrace$setregset(0x4209, r10, 0x20000004, 0x0) getpgrp(r10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r11) r12 = getegid() r13 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r13, 0x1, 0x0, 0x0, 0x0) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r14, 0x4c80, 0x0) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r15, 0x4c80, 0x0) syz_open_dev$binderN(&(0x7f0000000b00)='/dev/binder#\x00', 0x0, 0x2) r16 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r16, 0x40086602, 0x0) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r17, 0xc008240a, &(0x7f0000003a00)=ANY=[@ANYRES64=0x0]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r18 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r18, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r18, 0x4c80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r19 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r19, 0x40086602, 0x0) r20 = inotify_init1(0x0) fcntl$setown(r20, 0x8, 0xffffffffffffffff) fcntl$getownex(r20, 0x10, &(0x7f0000000080)) accept$inet(0xffffffffffffffff, &(0x7f00000012c0)={0x2, 0x0, @multicast2}, &(0x7f0000001300)=0x10) r21 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r21, 0x1, 0x0, 0x0, 0x0) r22 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r22, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r22, 0x4c80, 0x0) r23 = inotify_init1(0x0) fcntl$setown(r23, 0x8, 0xffffffffffffffff) fcntl$getownex(r23, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r24, 0x0, 0x0) ptrace$setregset(0x4209, r24, 0x20000004, 0x0) getpgrp(r24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r25) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r26) getgroups(0x8, &(0x7f0000001340)=[0xee00, r12, r25, r26, r6, r8, 0x0, r7]) r27 = inotify_init1(0x0) fcntl$setown(r27, 0x8, 0xffffffffffffffff) r28 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r28, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x13e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r29, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r28, &(0x7f0000000140)={0x11, 0x0, r30, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r28, &(0x7f0000000040)="0303030003004c0000001100ff015b4202938207d9fb3780398d5375010000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000fbffffff0000", 0x68, 0x0, 0x0, 0x0) fcntl$getownex(r28, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r31, 0x0, 0x0) tkill(r31, 0x0) ptrace$setregset(0x4209, r31, 0x20000004, 0x0) getpgrp(r31) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000004e80)={0x0, 0x70, 0x5, 0x81, 0x7, 0x5, 0x0, 0x6, 0x96b18, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x71, 0x1, @perf_bp={&(0x7f0000004e40), 0x2}, 0x308c4, 0x7, 0xffff, 0x9, 0x2, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) r32 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r32, 0xc008240a, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r33 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r33, 0x1, 0x0, 0x0, 0x0) r34 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r34, 0x40086602, 0x0) ioctl$TIOCGPGRP(r34, 0x540f, &(0x7f0000004f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r35) getegid() r36 = inotify_init1(0x0) fcntl$setown(r36, 0x8, 0xffffffffffffffff) fcntl$getownex(r36, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r37, 0x0, 0x0) tkill(r37, 0x0) ptrace$setregset(0x4209, r37, 0x20000004, 0x0) getpgrp(r37) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004f40)={{{@in=@loopback, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000005040)=0x108) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r38) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r39) open(0x0, 0x0, 0x0) syz_emit_ethernet(0xb5, &(0x7f0000000040)={@remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@generic={0x10, "f66d1d0b837e00377c66fd107780585a35761bdae2045444fc9d33bb6f37f9f754f53572487cbc5bba8ff3abe4dc4eca6cdcaa84769408e8d1231dd8fbdd5f5af86df89f12c4b26e8a6e5f05cc12132ed6ebaad77b4ef7ef28bebbcf8e44e12f86e0599143cb16aa604bfb5e9b63eb66964b22fa0d5129466e42cd4163566fb0466d6d83fb5a5709ef92e9d848c91577deed7e5c0a8225d44f9fe888ce77c26e31a7f6a863d013"}}}, &(0x7f0000000100)={0x1, 0x2, [0x1a4, 0xe73, 0x86, 0x5ba]}) 13:35:30 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006180)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000640)=@nl=@unspec, 0x7d, &(0x7f0000002b00)=[{&(0x7f00000006c0)=""/1, 0x1}, {0x0}, {0x0}, {&(0x7f0000000300)=""/66, 0x41}, {&(0x7f0000002900)=""/255, 0x63}], 0x5, &(0x7f0000002b80)=""/7, 0x7}}, {{&(0x7f0000002bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0xfffffffffffffddc, &(0x7f0000002dc0)=[{&(0x7f0000002c40)=""/82, 0x52}], 0x1}, 0x1}, {{&(0x7f0000002e00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000002ec0)=""/181, 0xb5}, 0xffffffff}, {{&(0x7f0000002f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005300)=[{&(0x7f0000003000)=""/183, 0xb7}, {0x0, 0x154}, {0x0}, {&(0x7f0000003140)=""/4096, 0xe7}, {&(0x7f0000004140)=""/4096, 0x1000}, {0x0, 0xfffffffffffffe47}], 0x6, &(0x7f0000005380)=""/121, 0x79}, 0x2}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000005940)=""/109, 0x6d}}, {{&(0x7f0000000480)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0xffffffb6, &(0x7f0000005e00)=[{&(0x7f0000005a40)=""/188, 0x20d}, {&(0x7f0000005b00)=""/243, 0xf3}, {0x0}, {&(0x7f0000005d00)=""/74, 0x4a}, {&(0x7f0000005dc0)=""/23, 0x17}], 0x5}}], 0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20000000000}, 0x114c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() r0 = socket$inet6(0xa, 0x80000, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x32}, 0x0, @in6=@rand_addr="6f3829d7da47d9bb345810ed11c63d35", 0x0, 0x1, 0x0, 0x6}}, 0xe8) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) r5 = dup2(r2, r0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r6, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e", 0x3d, 0x400c000, 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) ioctl$FS_IOC_SETFSLABEL(r6, 0x41009432, &(0x7f0000000200)="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") sendmsg$netlink(r5, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 13:35:30 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:30 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000180)="93b0fe3e6c6c66a89a8368abfcc751f4200c5914e6499e470ccd3c70755e343433eb1e51193d15bc7534e5e2177b6d39e6fcab7f639583697fb0ba300d0c6045315a7969986a9f0eda789ccf53317b1a28ae52d5761859b3a40fc53804840b899b36e54d5fdfaac1be76bc970ae4809670e12d84a6acb8c3fba3aeb8b4512520fa5a47f58ce81148811a40625d700e3a397e7506efd6aedaf551613d7379b1f088f6fa6df60a0ec904a1da18b737c6981cbd713e3c746c8381a43bbe1d20b53f062ffcfd5bb65e32f8a73dec862faecb1c84f93a16e24b90", 0xd8, 0x20000000, &(0x7f0000000280)={0xa, 0x4e22, 0xfffffffe, @empty, 0x1ff}, 0x1c) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000100)=@profile={'permprofile ', '^posix_acl_access;)/\x00'}, 0x21) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) close(r3) sendmsg$unix(r3, &(0x7f0000000880)={&(0x7f0000000140)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x10}}], 0x10}, 0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x2b) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000002c0)=0x0) fcntl$setown(r1, 0x8, r4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0800ffff53ef", 0x8a, 0x400}], 0x4801, 0x0) 13:35:30 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x11, 0x0, 0x100000001) 13:35:30 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:31 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 13:35:31 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000740)={&(0x7f0000000000)={0xa, 0x4e23, 0x10000000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x0, 0x4, [], [@enc_lim={0x4, 0x1, 0x80}, @padn={0x1, 0x1, [0x0]}, @pad1, @hao={0xc9, 0x10, @remote}, @pad1, @enc_lim={0x4, 0x1, 0x3}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x2, 0x2, [], [@pad1, @hao={0xc9, 0x10, @loopback}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x44}}, @dstopts={{0xd0, 0x29, 0x37, {0x6c, 0x16, [], [@hao={0xc9, 0x10, @rand_addr="157462d82083f1e9c4e117d7f460160f"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x81, 0x7b, "3c2796892a2284bb58b4243b62dd3fdb2be165040ce89b76eb85c38b4435ead921f58a61041af228d8e437b5b98f409acedd75941b26f1fe76c7c264657e4796e4607a6360da022a1d63c2c636614e29fb2ec3904f8c3df398249d1b04e1abe1f37c32ed57ac0a15b7f88f031e70e76edb16ff1e15d60047fb8471"}, @calipso={0x7, 0x10, {0x5, 0x2, 0x7f, 0x8, [0x3f]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xe9}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x1c8}, 0x4000000) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x0) ptrace$setregset(0x4209, r5, 0x20000004, 0x0) getpgrp(r5) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getgroups(0x1, &(0x7f0000000700)=[r7]) r9 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r10, 0x0) ptrace$setregset(0x4209, r10, 0x20000004, 0x0) getpgrp(r10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r11) r12 = getegid() r13 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r13, 0x1, 0x0, 0x0, 0x0) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r14, 0x4c80, 0x0) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r15, 0x4c80, 0x0) syz_open_dev$binderN(&(0x7f0000000b00)='/dev/binder#\x00', 0x0, 0x2) r16 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r16, 0x40086602, 0x0) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r17, 0xc008240a, &(0x7f0000003a00)=ANY=[@ANYRES64=0x0]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r18 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r18, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r18, 0x4c80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r19 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r19, 0x40086602, 0x0) r20 = inotify_init1(0x0) fcntl$setown(r20, 0x8, 0xffffffffffffffff) fcntl$getownex(r20, 0x10, &(0x7f0000000080)) accept$inet(0xffffffffffffffff, &(0x7f00000012c0)={0x2, 0x0, @multicast2}, &(0x7f0000001300)=0x10) r21 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r21, 0x1, 0x0, 0x0, 0x0) r22 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r22, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r22, 0x4c80, 0x0) r23 = inotify_init1(0x0) fcntl$setown(r23, 0x8, 0xffffffffffffffff) fcntl$getownex(r23, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r24, 0x0, 0x0) ptrace$setregset(0x4209, r24, 0x20000004, 0x0) getpgrp(r24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r25) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r26) getgroups(0x8, &(0x7f0000001340)=[0xee00, r12, r25, r26, r6, r8, 0x0, r7]) r27 = inotify_init1(0x0) fcntl$setown(r27, 0x8, 0xffffffffffffffff) r28 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r28, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x13e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r29, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r28, &(0x7f0000000140)={0x11, 0x0, r30, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r28, &(0x7f0000000040)="0303030003004c0000001100ff015b4202938207d9fb3780398d5375010000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000fbffffff0000", 0x68, 0x0, 0x0, 0x0) fcntl$getownex(r28, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r31, 0x0, 0x0) tkill(r31, 0x0) ptrace$setregset(0x4209, r31, 0x20000004, 0x0) getpgrp(r31) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000004e80)={0x0, 0x70, 0x5, 0x81, 0x7, 0x5, 0x0, 0x6, 0x96b18, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x71, 0x1, @perf_bp={&(0x7f0000004e40), 0x2}, 0x308c4, 0x7, 0xffff, 0x9, 0x2, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) r32 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r32, 0xc008240a, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r33 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r33, 0x1, 0x0, 0x0, 0x0) r34 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r34, 0x40086602, 0x0) ioctl$TIOCGPGRP(r34, 0x540f, &(0x7f0000004f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r35) getegid() r36 = inotify_init1(0x0) fcntl$setown(r36, 0x8, 0xffffffffffffffff) fcntl$getownex(r36, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r37, 0x0, 0x0) tkill(r37, 0x0) ptrace$setregset(0x4209, r37, 0x20000004, 0x0) getpgrp(r37) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004f40)={{{@in=@loopback, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000005040)=0x108) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r38) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r39) open(0x0, 0x0, 0x0) syz_emit_ethernet(0xb5, &(0x7f0000000040)={@remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@generic={0x10, "f66d1d0b837e00377c66fd107780585a35761bdae2045444fc9d33bb6f37f9f754f53572487cbc5bba8ff3abe4dc4eca6cdcaa84769408e8d1231dd8fbdd5f5af86df89f12c4b26e8a6e5f05cc12132ed6ebaad77b4ef7ef28bebbcf8e44e12f86e0599143cb16aa604bfb5e9b63eb66964b22fa0d5129466e42cd4163566fb0466d6d83fb5a5709ef92e9d848c91577deed7e5c0a8225d44f9fe888ce77c26e31a7f6a863d013"}}}, &(0x7f0000000100)={0x1, 0x2, [0x1a4, 0xe73, 0x86, 0x5ba]}) 13:35:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:31 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 13:35:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:31 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:32 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:32 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r4, 0x2, 0x6, 0x5) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) 13:35:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x11, 0x0, 0x100000001) 13:35:32 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000740)={&(0x7f0000000000)={0xa, 0x4e23, 0x10000000, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x0, 0x4, [], [@enc_lim={0x4, 0x1, 0x80}, @padn={0x1, 0x1, [0x0]}, @pad1, @hao={0xc9, 0x10, @remote}, @pad1, @enc_lim={0x4, 0x1, 0x3}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x2, 0x2, [], [@pad1, @hao={0xc9, 0x10, @loopback}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x44}}, @dstopts={{0xd0, 0x29, 0x37, {0x6c, 0x16, [], [@hao={0xc9, 0x10, @rand_addr="157462d82083f1e9c4e117d7f460160f"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x81, 0x7b, "3c2796892a2284bb58b4243b62dd3fdb2be165040ce89b76eb85c38b4435ead921f58a61041af228d8e437b5b98f409acedd75941b26f1fe76c7c264657e4796e4607a6360da022a1d63c2c636614e29fb2ec3904f8c3df398249d1b04e1abe1f37c32ed57ac0a15b7f88f031e70e76edb16ff1e15d60047fb8471"}, @calipso={0x7, 0x10, {0x5, 0x2, 0x7f, 0x8, [0x3f]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xe9}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}], 0x1c8}, 0x4000000) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x0) ptrace$setregset(0x4209, r5, 0x20000004, 0x0) getpgrp(r5) lstat(0x0, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r6) syz_open_dev$loop(&(0x7f0000000680)='/dev/loop#\x00', 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r7) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getgroups(0x1, &(0x7f0000000700)=[r7]) r9 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r9, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r10, 0x0) ptrace$setregset(0x4209, r10, 0x20000004, 0x0) getpgrp(r10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r11) r12 = getegid() r13 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r13, 0x1, 0x0, 0x0, 0x0) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r14, 0x4c80, 0x0) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r15, 0x4c80, 0x0) syz_open_dev$binderN(&(0x7f0000000b00)='/dev/binder#\x00', 0x0, 0x2) r16 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r16, 0x40086602, 0x0) r17 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r17, 0xc008240a, &(0x7f0000003a00)=ANY=[@ANYRES64=0x0]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r18 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r18, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r18, 0x4c80, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r19 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r19, 0x40086602, 0x0) r20 = inotify_init1(0x0) fcntl$setown(r20, 0x8, 0xffffffffffffffff) fcntl$getownex(r20, 0x10, &(0x7f0000000080)) accept$inet(0xffffffffffffffff, &(0x7f00000012c0)={0x2, 0x0, @multicast2}, &(0x7f0000001300)=0x10) r21 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r21, 0x1, 0x0, 0x0, 0x0) r22 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r22, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r22, 0x4c80, 0x0) r23 = inotify_init1(0x0) fcntl$setown(r23, 0x8, 0xffffffffffffffff) fcntl$getownex(r23, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r24, 0x0, 0x0) ptrace$setregset(0x4209, r24, 0x20000004, 0x0) getpgrp(r24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r25) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r26) getgroups(0x8, &(0x7f0000001340)=[0xee00, r12, r25, r26, r6, r8, 0x0, r7]) r27 = inotify_init1(0x0) fcntl$setown(r27, 0x8, 0xffffffffffffffff) r28 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r28, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x13e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r29, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r28, &(0x7f0000000140)={0x11, 0x0, r30, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r28, &(0x7f0000000040)="0303030003004c0000001100ff015b4202938207d9fb3780398d5375010000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000fbffffff0000", 0x68, 0x0, 0x0, 0x0) fcntl$getownex(r28, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r31, 0x0, 0x0) tkill(r31, 0x0) ptrace$setregset(0x4209, r31, 0x20000004, 0x0) getpgrp(r31) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000004e80)={0x0, 0x70, 0x5, 0x81, 0x7, 0x5, 0x0, 0x6, 0x96b18, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x71, 0x1, @perf_bp={&(0x7f0000004e40), 0x2}, 0x308c4, 0x7, 0xffff, 0x9, 0x2, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) r32 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r32, 0xc008240a, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"]) r33 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r33, 0x1, 0x0, 0x0, 0x0) r34 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r34, 0x40086602, 0x0) ioctl$TIOCGPGRP(r34, 0x540f, &(0x7f0000004f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r35) getegid() r36 = inotify_init1(0x0) fcntl$setown(r36, 0x8, 0xffffffffffffffff) fcntl$getownex(r36, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r37, 0x0, 0x0) tkill(r37, 0x0) ptrace$setregset(0x4209, r37, 0x20000004, 0x0) getpgrp(r37) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004f40)={{{@in=@loopback, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000005040)=0x108) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r38) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r39) open(0x0, 0x0, 0x0) syz_emit_ethernet(0xb5, &(0x7f0000000040)={@remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@generic={0x10, "f66d1d0b837e00377c66fd107780585a35761bdae2045444fc9d33bb6f37f9f754f53572487cbc5bba8ff3abe4dc4eca6cdcaa84769408e8d1231dd8fbdd5f5af86df89f12c4b26e8a6e5f05cc12132ed6ebaad77b4ef7ef28bebbcf8e44e12f86e0599143cb16aa604bfb5e9b63eb66964b22fa0d5129466e42cd4163566fb0466d6d83fb5a5709ef92e9d848c91577deed7e5c0a8225d44f9fe888ce77c26e31a7f6a863d013"}}}, &(0x7f0000000100)={0x1, 0x2, [0x1a4, 0xe73, 0x86, 0x5ba]}) 13:35:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r4 = accept(r3, 0x0, &(0x7f0000000400)) bind$inet(r4, &(0x7f0000000440)={0x2, 0x4e21, @empty}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/323], 0x14}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x11) 13:35:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:32 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000005c0)="f9a26ed3feff7ce648593d3a06931d31627afb76f259c8f904ae0881f0d2dbed3194ad4effad206759c644b750e491f2648d8f3b87bdea73914e89dffe0edead", 0xfffffffffffffe48) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0xfffffffffffffe8c, 0x7d, 0x0, 0x9, 0xe1, 0x0, 0xffffffffffffff8f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff805, 0x2, @perf_config_ext={0x0, 0x392}, 0xd86113be646f5d43, 0x7, 0x4, 0x1, 0x9, 0x1, 0xe5}, 0x0, 0x0, r0, 0x0) getuid() ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/access\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="767c1a74656d5f753a6fbfb56290feffa3717f626a6563745f723a70096d5f657865635f743a733020756e636f6c66696e65642030303030303034301830303030303030303030330001e280c5"], 0x44) unshare(0x20020000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2f4047c2b771e0af594fede65c313d59d6a9205e91484ed3f74dd44c470b2cf6f329085680b4de55f34a222c65c87546837d70f759ce099dea735867af02fc26f85f91890ec06a1c9902ede06ed4f7473dadc0b8ccee70a0bf21f3cc88a357d834bbc15f12493a7b4e93322cc13d5a4d0c95cabe838380aded841259bbb893951ff2690b48fa854219fe43d6ecb9cc16a68b60ee7dc5094e4eaa90dab884bddbd60cdd8b3c9b81db818881d2fd543b1270d13085f3952899d532292f56a20c77d04d47e22041bae0ae5098b13d63c8c4d00b5903dbc3c8fcdd894ef1add4ba4e00e99000"], 0x3) fallocate(r2, 0x0, 0x0, 0x8020001) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000740)={0xb5}, 0x4) mount$bpf(0x0, &(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000200)='bpf\x00', 0x5c276eebbee472dc, &(0x7f0000000340)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x100) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') 13:35:32 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r2, 0x11, 0x0, 0x100000001) [ 1083.207250] ================================================================== [ 1083.214825] BUG: KASAN: use-after-free in disk_unblock_events+0x4b/0x50 [ 1083.221588] Read of size 8 at addr ffff8881d5c09ee8 by task syz-executor.0/30680 [ 1083.229231] [ 1083.230866] CPU: 0 PID: 30680 Comm: syz-executor.0 Not tainted 4.14.154+ #0 [ 1083.237982] Call Trace: [ 1083.240583] dump_stack+0xe5/0x154 [ 1083.244144] ? disk_unblock_events+0x4b/0x50 [ 1083.248564] ? disk_unblock_events+0x4b/0x50 13:35:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r4 = accept(r3, 0x0, &(0x7f0000000400)) bind$inet(r4, &(0x7f0000000440)={0x2, 0x4e21, @empty}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/323], 0x14}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x11) [ 1083.253010] print_address_description+0x60/0x226 [ 1083.257878] ? disk_unblock_events+0x4b/0x50 [ 1083.262330] ? disk_unblock_events+0x4b/0x50 [ 1083.266759] __kasan_report.cold+0x1a/0x41 [ 1083.271029] ? disk_unblock_events+0x4b/0x50 [ 1083.275453] disk_unblock_events+0x4b/0x50 [ 1083.279701] __blkdev_get+0x68f/0xf90 [ 1083.283529] ? __blkdev_put+0x6d0/0x6d0 [ 1083.287529] blkdev_get+0x97/0x8b0 [ 1083.291093] ? bd_acquire+0x171/0x2c0 [ 1083.294899] ? bd_may_claim+0xd0/0xd0 [ 1083.298705] ? lock_downgrade+0x630/0x630 [ 1083.303239] ? lock_acquire+0x12b/0x360 [ 1083.307218] ? bd_acquire+0x21/0x2c0 [ 1083.310953] ? do_raw_spin_unlock+0x13f/0x220 [ 1083.315475] blkdev_open+0x1cc/0x250 [ 1083.319280] ? security_file_open+0x88/0x190 [ 1083.323701] do_dentry_open+0x44e/0xe20 [ 1083.327685] ? bd_acquire+0x2c0/0x2c0 [ 1083.331530] vfs_open+0x105/0x230 [ 1083.335001] path_openat+0xb6c/0x2be0 [ 1083.338835] ? path_mountpoint+0x9a0/0x9a0 [ 1083.343082] ? perf_trace_lock+0x11e/0x4e0 [ 1083.347350] do_filp_open+0x1a1/0x280 [ 1083.351160] ? may_open_dev+0xe0/0xe0 [ 1083.354982] ? lock_downgrade+0x630/0x630 [ 1083.359134] ? lock_acquire+0x12b/0x360 [ 1083.363112] ? __alloc_fd+0x3f/0x490 [ 1083.366864] ? do_raw_spin_unlock+0x13f/0x220 [ 1083.371363] ? _raw_spin_unlock+0x29/0x40 [ 1083.375510] ? __alloc_fd+0x1bf/0x490 [ 1083.379332] do_sys_open+0x2ca/0x590 [ 1083.383058] ? filp_open+0x60/0x60 [ 1083.386598] ? SyS_mkdirat+0x146/0x220 [ 1083.390493] ? _raw_spin_unlock_irq+0x35/0x50 [ 1083.395091] ? do_syscall_64+0x43/0x520 [ 1083.399070] ? do_sys_open+0x590/0x590 [ 1083.402971] do_syscall_64+0x19b/0x520 [ 1083.406875] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1083.412065] RIP: 0033:0x4143d0 [ 1083.415860] RSP: 002b:00007ffe735139a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1083.423659] RAX: ffffffffffffffda RBX: 00000000001086e6 RCX: 00000000004143d0 [ 1083.430935] RDX: 00007ffe73513a3a RSI: 0000000000000002 RDI: 00007ffe73513a30 [ 1083.438210] RBP: 00000000000007be R08: 0000000000000000 R09: 000000000000000a [ 1083.445487] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 1083.452846] R13: 00007ffe735139e0 R14: 000000000010867c R15: 00007ffe735139f0 [ 1083.460271] [ 1083.461906] Allocated by task 18726: [ 1083.465643] __kasan_kmalloc.part.0+0x53/0xc0 [ 1083.470145] alloc_disk_node+0x5b/0x3d0 [ 1083.474124] loop_add+0x3ee/0x870 [ 1083.477575] loop_control_ioctl+0x130/0x310 [ 1083.481901] do_vfs_ioctl+0xabe/0x1040 [ 1083.485829] SyS_ioctl+0x7f/0xb0 [ 1083.489300] do_syscall_64+0x19b/0x520 [ 1083.493194] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1083.498396] 0xffffffffffffffff [ 1083.501679] [ 1083.503305] Freed by task 30680: [ 1083.506673] __kasan_slab_free+0x164/0x210 [ 1083.510910] kfree+0x108/0x3a0 [ 1083.514102] device_release+0xf4/0x1a0 [ 1083.517993] kobject_put+0x142/0x200 [ 1083.521733] put_disk+0x1f/0x30 [ 1083.525018] __blkdev_get+0x5fa/0xf90 [ 1083.528820] blkdev_get+0x97/0x8b0 [ 1083.532363] blkdev_open+0x1cc/0x250 [ 1083.536080] do_dentry_open+0x44e/0xe20 [ 1083.540057] vfs_open+0x105/0x230 [ 1083.543518] path_openat+0xb6c/0x2be0 [ 1083.547324] do_filp_open+0x1a1/0x280 [ 1083.551130] do_sys_open+0x2ca/0x590 [ 1083.554845] do_syscall_64+0x19b/0x520 [ 1083.558743] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1083.563940] 0xffffffffffffffff [ 1083.567215] [ 1083.568842] The buggy address belongs to the object at ffff8881d5c09980 [ 1083.568842] which belongs to the cache kmalloc-2048 of size 2048 [ 1083.581681] The buggy address is located 1384 bytes inside of [ 1083.581681] 2048-byte region [ffff8881d5c09980, ffff8881d5c0a180) [ 1083.593731] The buggy address belongs to the page: [ 1083.598682] page:ffffea0007570200 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 1083.608659] flags: 0x4000000000010200(slab|head) [ 1083.613426] raw: 4000000000010200 0000000000000000 0000000000000000 00000001000f000f [ 1083.621313] raw: dead000000000100 dead000000000200 ffff8881da802800 0000000000000000 [ 1083.629192] page dumped because: kasan: bad access detected [ 1083.634899] [ 1083.636521] Memory state around the buggy address: [ 1083.641449] ffff8881d5c09d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1083.648810] ffff8881d5c09e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 13:35:32 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) [ 1083.656234] >ffff8881d5c09e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1083.663597] ^ [ 1083.670374] ffff8881d5c09f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1083.677739] ffff8881d5c09f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1083.685100] ================================================================== [ 1083.692457] Disabling lock debugging due to kernel taint 13:35:33 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000280)) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r6, 0x2, 0x6, 0x5) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:33 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, 0x0, 0x0) r2 = dup2(r0, r0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @rand_addr, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}}}}}}}}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000003c0)=0x6) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fallocate(r5, 0x2, 0x6, 0x5) fallocate(r3, 0x11, 0x0, 0x100000001) 13:35:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@local}}, 0xe8) r4 = accept(r3, 0x0, &(0x7f0000000400)) bind$inet(r4, &(0x7f0000000440)={0x2, 0x4e21, @empty}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000368, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/323], 0x14}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) truncate(&(0x7f0000000240)='./file0\x00', 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x11) [ 1083.933544] Kernel panic - not syncing: panic_on_warn set ... [ 1083.933544] [ 1083.940964] CPU: 1 PID: 30680 Comm: syz-executor.0 Tainted: G B 4.14.154+ #0 [ 1083.949282] Call Trace: [ 1083.951874] dump_stack+0xe5/0x154 [ 1083.955428] panic+0x1f1/0x3da [ 1083.958631] ? add_taint.cold+0x16/0x16 [ 1083.962638] ? disk_unblock_events+0x4b/0x50 [ 1083.967062] ? ___preempt_schedule+0x16/0x18 [ 1083.971470] ? disk_unblock_events+0x4b/0x50 [ 1083.975955] end_report+0x43/0x49 [ 1083.979400] ? disk_unblock_events+0x4b/0x50 [ 1083.983788] __kasan_report.cold+0xd/0x41 [ 1083.987919] ? disk_unblock_events+0x4b/0x50 [ 1083.992319] disk_unblock_events+0x4b/0x50 [ 1083.996537] __blkdev_get+0x68f/0xf90 [ 1084.001294] ? __blkdev_put+0x6d0/0x6d0 [ 1084.005281] blkdev_get+0x97/0x8b0 [ 1084.008807] ? bd_acquire+0x171/0x2c0 [ 1084.012589] ? bd_may_claim+0xd0/0xd0 [ 1084.016387] ? lock_downgrade+0x630/0x630 [ 1084.020524] ? lock_acquire+0x12b/0x360 [ 1084.025174] ? bd_acquire+0x21/0x2c0 [ 1084.028874] ? do_raw_spin_unlock+0x13f/0x220 [ 1084.033358] blkdev_open+0x1cc/0x250 [ 1084.037063] ? security_file_open+0x88/0x190 [ 1084.041541] do_dentry_open+0x44e/0xe20 [ 1084.045498] ? bd_acquire+0x2c0/0x2c0 [ 1084.049286] vfs_open+0x105/0x230 [ 1084.052731] path_openat+0xb6c/0x2be0 [ 1084.056521] ? path_mountpoint+0x9a0/0x9a0 [ 1084.060744] ? perf_trace_lock+0x11e/0x4e0 [ 1084.064965] do_filp_open+0x1a1/0x280 [ 1084.068748] ? may_open_dev+0xe0/0xe0 [ 1084.072537] ? lock_downgrade+0x630/0x630 [ 1084.076664] ? lock_acquire+0x12b/0x360 [ 1084.080632] ? __alloc_fd+0x3f/0x490 [ 1084.084332] ? do_raw_spin_unlock+0x13f/0x220 [ 1084.088812] ? _raw_spin_unlock+0x29/0x40 [ 1084.092946] ? __alloc_fd+0x1bf/0x490 [ 1084.096738] do_sys_open+0x2ca/0x590 [ 1084.100870] ? filp_open+0x60/0x60 [ 1084.106040] ? SyS_mkdirat+0x146/0x220 [ 1084.109918] ? _raw_spin_unlock_irq+0x35/0x50 [ 1084.114424] ? do_syscall_64+0x43/0x520 [ 1084.118392] ? do_sys_open+0x590/0x590 [ 1084.122263] do_syscall_64+0x19b/0x520 [ 1084.127091] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1084.132269] RIP: 0033:0x4143d0 [ 1084.135438] RSP: 002b:00007ffe735139a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1084.143137] RAX: ffffffffffffffda RBX: 00000000001086e6 RCX: 00000000004143d0 [ 1084.150997] RDX: 00007ffe73513a3a RSI: 0000000000000002 RDI: 00007ffe73513a30 [ 1084.158250] RBP: 00000000000007be R08: 0000000000000000 R09: 000000000000000a [ 1084.165510] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 1084.172776] R13: 00007ffe735139e0 R14: 000000000010867c R15: 00007ffe735139f0 [ 1084.180750] Kernel Offset: 0x19600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1084.191674] Rebooting in 86400 seconds..