t$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(r2, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000740)=""/107) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) 17:30:24 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) setfsuid(r1) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x400000000006, 0x4) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x4}, 0x4) 17:30:24 executing program 4: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r3 = socket$inet6(0xa, 0x80001, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000001280)='system.posix_acl_access\x00', &(0x7f0000001640)=ANY=[@ANYBLOB="02000000f7ff", @ANYRES32, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="040000000000040010000000"], 0x7, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001680)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000b200000089704634a410ae246de412156834578c4d321557f83b35d7ac505b340003e23db972e920ac43db237dd5ddc09a52d318ca9fa32f8788ac64e69a1b2ec33fbf3e0633ecdf929c7a3ff59734ce5af1e769ec98c48ab09e3c6233ca3ed44283723257006179d607c2adc5afc27c202434a93feb84ae1698ac95ded796f77d8b4a84670158b23c42a3fe6a16f57033583626265879768bf49167261ea022103c50623b7b08711d1ad23cd7766bb02cd76d641cd6"], &(0x7f0000001780)=0xd6) add_key(&(0x7f0000001ac0)='keyring\x00', &(0x7f0000001b00)={'syz', 0x2}, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffe) setreuid(r2, r2) clock_gettime(0x0, &(0x7f0000001340)={0x0, 0x0}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) futimesat(0xffffffffffffffff, &(0x7f0000001300)='./file0\x00', &(0x7f0000001380)={{0x0, 0x2710}, {r4, r5/1000+10000}}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') keyctl$instantiate(0xc, 0x0, &(0x7f00000017c0)=ANY=[], 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000000)=0x68) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/34, 0x10000017a}], 0x2, 0x0) 17:30:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="02050000fcff0000000000000000000002010000000000004000000000e30003000500000000cf89000000e0000018000000000001000000"], 0x38}}, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) 17:30:24 executing program 4: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000740)=""/107) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) 17:30:25 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) readlink(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000080)=""/11, 0xb) lsetxattr$security_selinux(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:dhcpd_exec_t:s0\x00', 0x22, 0x0) 17:30:25 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) r3 = epoll_create1(0x0) r4 = gettid() fcntl$lock(r3, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r4}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000300)={r2, 0x3, 0x6, @local}, 0x10) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000080)={r2, 0x1, 0x6, @link_local}, 0x10) 17:30:25 executing program 0: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000740)=""/107) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) 17:30:25 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) io_destroy(r2) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x428002, 0x0) write$P9_RLERRORu(r3, &(0x7f00000003c0)={0x2c2, 0x7, 0x2, {{0xfe27, 'em0'}, 0x20001002}}, 0x13) [ 145.010455] device lo entered promiscuous mode [ 145.017360] device lo left promiscuous mode 17:30:25 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 17:30:25 executing program 3: write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f08000280010000", 0x23) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x804, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) fstat(0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket(0xf, 0x5, 0x9) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r4, 0x401) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000), 0x0) bind(r3, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x17, &(0x7f0000000080)=0x100000001, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000000c0)=']\'\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r5, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tableX_targets\x00W^\xfc7\x84d\xd1\x18T\xb6\v\xa8IG\xe4/&sD\x1c)\x94\nX\t\xa5s\xe0qh\xde[3\xed\xd6%\x1a\x83j,{\x1awYsu\xee\r2\xf0h\"D\xb8B\xc3\xdf') 17:30:25 executing program 4: socket$inet(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r0, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000740)=""/107) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) 17:30:25 executing program 5: write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f08000280010000", 0x23) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x804, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) fstat(0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket(0xf, 0x5, 0x9) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r4, 0x401) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000), 0x0) bind(r3, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x17, &(0x7f0000000080)=0x100000001, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000000c0)=']\'\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r5, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tableX_targets\x00W^\xfc7\x84d\xd1\x18T\xb6\v\xa8IG\xe4/&sD\x1c)\x94\nX\t\xa5s\xe0qh\xde[3\xed\xd6%\x1a\x83j,{\x1awYsu\xee\r2\xf0h\"D\xb8B\xc3\xdf') 17:30:25 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@v1={0x2, "c08643"}, 0x4, 0x2) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_cache\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x9, 0x4e20, 0x200, 0xa, 0x20, 0xa0, 0x7f, r4, r1}, {0xfff, 0xd738, 0x0, 0x9, 0x2, 0x3240500b, 0x6, 0x5}, {0x7fff, 0x1, 0x6, 0xefd}, 0x401, 0x6e6bbc, 0x3, 0xcd3770d8ba560ff9, 0x2}, {{@in6=@remote, 0x4d3, 0x947545a514743de4}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3506, 0x0, 0x2, 0x7f, 0xc6, 0x4, 0x7ff}}, 0xe8) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000540)) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fsetxattr$security_capability(r5, &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v2={0x2000000, [{0x401, 0x6}, {0x7fff, 0x3c0}]}, 0x14, 0x1) ioctl$IOC_PR_PREEMPT(r5, 0x401870cb, &(0x7f0000000640)={0x1000, 0x4, 0x5, 0xffffffff}) write$P9_RREAD(r5, &(0x7f0000000680)={0xd7, 0x75, 0x1, {0xcc, "7f06a852ee0ed3ee490bf1839e7e2386b5460362290ae6d38b2951d41f139e572459cee6b756800df8b370b2dd3bca222cb3c85e9fdba6962550696abbf5aebf6e734c6f5478a62c6e99185914fdc3da0212989a80212d68b87295b380e27552828d4c65eca7496ce03dadb4e65bb8fcbccf0e01cb8798af55e9f82e01543868b8b907a59c302236bdf2b6fb9895303ac82928fbca6d9aca27f6979ff2105f1ade335e44d30ba381da01f6c1dfedd068c0b9b5a1e882096267d93e0fcd635b20c0f12d61f3a32521a716ba13"}}, 0xd7) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000780)={@loopback, @broadcast, r4}, 0xc) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000007c0)={'veth0_to_bridge\x00', 0x7}) r6 = openat(r5, &(0x7f0000000800)='./file0\x00', 0x28000, 0x80) getsockname$packet(r5, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000900)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r3, &(0x7f00000009c0)={&(0x7f00000008c0), 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x14, r7, 0x100, 0x70bd25, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$FUSE_POLL(r5, &(0x7f0000000a40)={0x18, 0x0, 0x1, {0x3}}, 0x18) fcntl$getown(r3, 0x9) mount$fuse(0x0, &(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='fuse\x00', 0x240020, &(0x7f0000000b00)={{'fd', 0x3d, r5}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xfffffffffffffc00}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@max_read={'max_read', 0x3d, 0xfff}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x100000000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@measure='measure'}, {@fowner_eq={'fowner', 0x3d, r1}}, {@obj_user={'obj_user', 0x3d, '/selinux/avc/cache_threshold\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@obj_type={'obj_type', 0x3d, 'cgroup'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@measure='measure'}, {@fowner_gt={'fowner>', r1}}]}}) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000d00)='trusted.overlay.redirect\x00', &(0x7f0000000d40)='./file0\x00', 0x8, 0x2) sendmsg(r6, &(0x7f00000012c0)={&(0x7f0000000d80)=@in={0x2, 0x4e23, @empty}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e00)="cc592a9c6b4c35f1d3e02ba2c6a86d5f7cfc754e3a8211f573db7370d301e93d232321d88e97540d70741b1ec5c6f17f5e36b3510e6e914fbcc7211ffda741c1f890ec7408676289e23280efeb76460b32f29798284ca328048c40765178e34e1753e7fc51c2172d2e033cf6ad9b70706c3c649c1a6139ae73ba7c97f569ca9f1fe1a269e0054e43efe409e60d21fdeabea4ee44ed07aac17ea6eff2d1e7e92aceeabe28b7cb01651c0c85faf89d4b525397ee4ef3adfa87aa4f3750bce72603feaee5f3d06bd3f267d7e3e0592e97e18c7f9d53d45b57c6103ba54f39f63ebc56ac08429477df21060c5a8756ef2a288b3ee4c4917fef6378", 0xf9}, {&(0x7f0000000f00)="de4bcceb953cbebba562703c7d5a1abda9ab8132f778f30800578a8933f55e5a17dfcbcb62813c362725390fcffdb5895b6d31b1fa84a546b87c15c79677413fcb5f13317cfd659866331dd43545657e5555a74a1ec194838762e08ee65ef0432258607f74ff086a718f248720185a23f69012c940034ba49b736a9f05458fdddbde79e67081c507ae6375aee184e4358eaa70d7ee15c6831624e41e9ad3e9aca1ef021b62432ee3c3bc3e504a9e775add6b8d8a358f715f143232a50337138945189f1efbfa038f182fd345afc99d74acc2eeae906acc0f3f02c21d7c2cb79c", 0xe0}], 0x2, &(0x7f0000001040)=[{0xa8, 0x102, 0x4, "c95cc321582617749423abd7872a85eada786c487ebf4a941586f928065f2399fd97e9b548ee937f38f2dcefc66ea14c56f0197e2d94a062dd3bed35819409815c778bd2bdd23fb5f4b7444b558f76a382d34a424da9ba60c85bba04752ac703d9d2306b64a1393b5dfcf8fd2bfe328ed6fa743231214f74a3485d00cfbc54b36e1201b7ec8fb8dc7ce94e42ec8285986294882e24dfcd35"}, {0x28, 0x114, 0x6, "206455a4cc5dd71d24d3d4763fb3317503a3e2"}, {0xc0, 0x108, 0x7f, "c7501bc2d422e8fa340efadb573066e442dc8b14c8d3c0b9a4de1c8cc3212b6060a8402ec025b5890c5a60971ef151dd46ff2c6193dd77620d9033d4ad148e45b1028512c5be21ba162d3f32e55a26c90c3eb84e94084151e65f534b63a38890a1f75f7265e5ca119e2b03d4edd600e6cee934e8a59d6ff1912e1ee6ac5b996008233ad172adc4762de17b8ec191d95b1abd02c7c4c8fc8f9662fcf9d8c335b07cafdc5ba13278d2469fac204c"}, {0xc8, 0x116, 0x1, "318cce771bb79d609b3aafe9f1b81eddb25446ec97515e57594687a9cd6c1897b85a1a5eb820766726925495181de39b5591c8b991a8945651b7175254602fb4b7fddad483bc3a079314e877db81f838851a8a29fb5e1231ca079425415fe52c82686f3416654de655ed055a37ae0b58e58afaa729c128368ccb65a6381d099f9e9cf98e206745826600bfcbe462ef3d4d4e502357b6ead1f9ace085eb31b4b5c03d1d595c23f5a1997614aab5132b0095cc8676d1b25f"}, {0x20, 0x112, 0x494, "982f93ed1ca946969887a89568"}], 0x278}, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fchownat(r3, &(0x7f0000001340)='./file0\x00', r1, r2, 0x400) getsockname$unix(r3, &(0x7f0000001380)=@abs, &(0x7f0000001400)=0x6e) lsetxattr$security_ima(&(0x7f0000001440)='./file1\x00', &(0x7f0000001480)='security.ima\x00', &(0x7f00000014c0)=@v2={0x5, 0x1, 0xb, 0x100000000, 0xfe, "34a02aebd76d4fd2a3047506ddca1428e05a6b8d56b6592373951dbe1d5490ea82c0c4d1eef25bd6cd81e7383922ebe3eb0eb21a87f9bed387fb2dcf857e76a627f84b75e45fe458835952cf6ced5099e365d2eb261a765c8303fc18b767de860a8dc1d6fc76b91d62f4de85359875c26ec740c0a9b6b62bae25a0637ec0fcfb48c0549caff54c1834b4535c86db539fbf7de6ecba3aaaa20294d48bf536d7d408ca0e6d0791426d2f4e853ff9f046c2f91a860ccb99aeb5d0a842b3f4cfb96247a09517fe1b7b064ebf2830932bafdcc5152b613cc7d0770570770994ea16ea68810aa3721b37eba186ab279275e8bfbfe0316aefdbe0e3a70167176c0a"}, 0x108, 0x3) ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000001600)) 17:30:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x1, 0x1) r3 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000003c0)=ANY=[]) gettid() syz_open_pts(0xffffffffffffffff, 0x9f3d14669e315f7a) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_pts(r4, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f0000000100)) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x301800, 0x0) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000140)=0xd63e) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=0x4, 0x1) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x0, 0x100004) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setflags(r6, 0x2, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = dup(r7) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000240)) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_bond\x00', 0x10) r9 = open(&(0x7f0000000280)='./bus\x00', 0x14d046, 0x0) ftruncate(r9, 0x2007fff) sendfile(r8, r9, &(0x7f0000d83ff8), 0x8000fffffffe) 17:30:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x30101}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="000329bd7000fcdbbc06010000007f005a4dcfceba33"], 0x1c}, 0x1, 0x0, 0x0, 0x8d1}, 0x4008080) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xf13) write$selinux_load(r2, &(0x7f0000000440)={0xf97cff8c, 0x4, 'SE Linux'}, 0x10) 17:30:26 executing program 5: write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f08000280010000", 0x23) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x804, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) fstat(0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket(0xf, 0x5, 0x9) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r4, 0x401) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000), 0x0) bind(r3, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x17, &(0x7f0000000080)=0x100000001, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000000c0)=']\'\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r5, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tableX_targets\x00W^\xfc7\x84d\xd1\x18T\xb6\v\xa8IG\xe4/&sD\x1c)\x94\nX\t\xa5s\xe0qh\xde[3\xed\xd6%\x1a\x83j,{\x1awYsu\xee\r2\xf0h\"D\xb8B\xc3\xdf') 17:30:26 executing program 4: socket$inet(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r0, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000740)=""/107) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) 17:30:26 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 17:30:26 executing program 3: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x804, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) fstat(0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket(0xf, 0x5, 0x9) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r4, 0x401) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000), 0x0) bind(r3, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x17, &(0x7f0000000080)=0x100000001, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000000c0)=']\'\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r5, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tableX_targets\x00W^\xfc7\x84d\xd1\x18T\xb6\v\xa8IG\xe4/&sD\x1c)\x94\nX\t\xa5s\xe0qh\xde[3\xed\xd6%\x1a\x83j,{\x1awYsu\xee\r2\xf0h\"D\xb8B\xc3\xdf') 17:30:26 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) [ 145.425436] SELinux: policydb string length 4 does not match expected length 8 17:30:26 executing program 4: r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000740)=""/107) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) 17:30:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101002, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x30101}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="000329bd7000fcdbbc06010000007f005a4dcfceba33"], 0x1c}, 0x1, 0x0, 0x0, 0x8d1}, 0x4008080) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xf13) write$selinux_load(r2, &(0x7f0000000440)={0xf97cff8c, 0x4, 'SE Linux'}, 0x10) [ 145.492746] SELinux: policydb string length 4 does not match expected length 8 17:30:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x1, 0x1) r3 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000003c0)=ANY=[]) gettid() syz_open_pts(0xffffffffffffffff, 0x9f3d14669e315f7a) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_pts(r4, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f0000000100)) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x301800, 0x0) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000140)=0xd63e) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=0x4, 0x1) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x0, 0x100004) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setflags(r6, 0x2, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = dup(r7) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000240)) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_bond\x00', 0x10) r9 = open(&(0x7f0000000280)='./bus\x00', 0x14d046, 0x0) ftruncate(r9, 0x2007fff) sendfile(r8, r9, &(0x7f0000d83ff8), 0x8000fffffffe) 17:30:26 executing program 5: write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f08000280010000", 0x23) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x804, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) fstat(0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket(0xf, 0x5, 0x9) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r4, 0x401) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000), 0x0) bind(r3, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x17, &(0x7f0000000080)=0x100000001, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000000c0)=']\'\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r5, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tableX_targets\x00W^\xfc7\x84d\xd1\x18T\xb6\v\xa8IG\xe4/&sD\x1c)\x94\nX\t\xa5s\xe0qh\xde[3\xed\xd6%\x1a\x83j,{\x1awYsu\xee\r2\xf0h\"D\xb8B\xc3\xdf') 17:30:26 executing program 0: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) [ 145.551958] SELinux: policydb string length 4 does not match expected length 8 17:30:26 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) r1 = timerfd_create(0x3, 0x78c82c9397f20e53) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3, r1, &(0x7f0000000040)="daec0748aaf97285feaac662aea9ea9e7f435729eae851262f27a46d6a525e132b0cec8aedb9ab4297a1e7ba292bafa5306ba37a24278bd3f7fab880d765ee0a70a5bff197ef94ae51b7b6222b2cdbfee3bdb35f6f5d709ece61204c", 0x5c, 0x20}, &(0x7f0000000100)) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x20) write$cgroup_type(r2, &(0x7f0000000240)='threaded\x00', 0xfffffefe) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x800) fallocate(r1, 0x3, 0x200000000, 0x4) fallocate(r2, 0x20, 0x0, 0x0) 17:30:26 executing program 4: r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000740)=""/107) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getsockname$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) 17:30:26 executing program 3: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x0, 0x804, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) prctl$PR_GET_TIMERSLACK(0x1e) fstat(0xffffffffffffffff, 0x0) sched_rr_get_interval(0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) r3 = socket(0xf, 0x5, 0x9) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getflags(r4, 0x401) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000000), 0x0) bind(r3, 0x0, 0x0) setsockopt$inet6_int(r3, 0x29, 0x17, &(0x7f0000000080)=0x100000001, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = memfd_create(&(0x7f00000000c0)=']\'\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r5, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_tableX_targets\x00W^\xfc7\x84d\xd1\x18T\xb6\v\xa8IG\xe4/&sD\x1c)\x94\nX\t\xa5s\xe0qh\xde[3\xed\xd6%\x1a\x83j,{\x1awYsu\xee\r2\xf0h\"D\xb8B\xc3\xdf') 17:30:26 executing program 0: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 17:30:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x1, 0x1) r3 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000003c0)=ANY=[]) gettid() syz_open_pts(0xffffffffffffffff, 0x9f3d14669e315f7a) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_pts(r4, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sched_setaffinity(0x0, 0x1, &(0x7f0000000100)) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x301800, 0x0) ioctl$PPPIOCSDEBUG(r5, 0x40047440, &(0x7f0000000140)=0xd63e) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=0x4, 0x1) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x0, 0x100004) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setflags(r6, 0x2, 0x0) r7 = socket$inet6(0xa, 0x400000000001, 0x0) r8 = dup(r7) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000240)) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_bond\x00', 0x10) r9 = open(&(0x7f0000000280)='./bus\x00', 0x14d046, 0x0) ftruncate(r9, 0x2007fff) sendfile(r8, r9, &(0x7f0000d83ff8), 0x8000fffffffe) 17:30:26 executing program 0: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 17:30:26 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0xffffffffffffffc6, r0, &(0x7f0000000040)="7500f7e3db841993ceb2ceb490e4679812b89a68fcfda7b847ee91741843f380e572db89ae50ca0e96441f2b41b9d2c21e712def6f187dc898c6fb3d610bbd18d537acfde9be6758f29748e76f8287cbe419a22b57f86df7ae00a6c0d98c30cbda4142f9aeb6ccf9004f8a8d52a184052dc637708296b537cc1c608809016238006722668f9f6565fc285cbe2c439a9ecffcc07373c59661ba96f55426caa2420332277236803b76a4c9ed932e3562406f79c4615f7fe477df96a4a8b367fe4d37e46dd8a2f40a8305538fdc1ce36e6123bb0008b0efc22cd4c4", 0xda, 0x6, 0x0, 0x0, r1}, &(0x7f00000001c0)) fallocate(r1, 0x0, 0x7ffd, 0x8000) fallocate(r1, 0x3, 0x0, 0xfff9) 17:30:27 executing program 0: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 17:30:27 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80003, 0x2) recvmmsg(r1, &(0x7f0000000200), 0x2ab, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000080)=0x4, 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8001) r2 = gettid() capset(&(0x7f00000000c0)={0x20071026, r2}, &(0x7f0000000140)={0x401, 0x7, 0x4, 0xffff, 0x401, 0x3f}) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000100)=0x1, 0x4) sendmmsg(r1, &(0x7f00000092c0), 0x398, 0x0) 17:30:29 executing program 0: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000700)={0xc, 0x8, 0xe, 0xb, 0x7, 0x9, 0x1, 0x113, 0x1}) vmsplice(0xffffffffffffffff, &(0x7f0000000b00)=[{0x0}, {0x0}, {&(0x7f0000000a40)}], 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) write$uinput_user_dev(r1, 0x0, 0x0) chdir(0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000006c0)=@gcm_128={{0x304}, "a103c88975d8fa32", "0a4ac06f8fdbf76fb745e7b94ae25118", "f99305cc", "55dd353d8ebf82b4"}, 0x28) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) recvfrom$unix(r0, &(0x7f0000000140)=""/127, 0x7f, 0x10000, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 17:30:29 executing program 1: socket$inet(0x10, 0x2, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, 0x0) r1 = syz_open_procfs(0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed] dump_stack+0xc1/0x120 [ 157.765553] [<000000003f107e7c>] ? get_disk+0xc9/0xe0 [ 157.770820] [<00000000f09c1efb>] print_address_description+0x6f/0x23a [ 157.777475] [<000000003f107e7c>] ? get_disk+0xc9/0xe0 [ 157.782739] [<00000000e2298eb1>] kasan_report.cold+0x8c/0x2ba [ 157.788698] [<0000000053f7de62>] __asan_report_load8_noabort+0x14/0x20 [ 157.795435] [<000000003f107e7c>] get_disk+0xc9/0xe0 [ 157.800585] [<00000000716e1783>] get_gendisk+0x171/0x2d0 [ 157.806111] [<0000000028bebc96>] __blkdev_get+0x356/0xeb0 [ 157.811724] [<0000000082607585>] ? debug_smp_processor_id+0x1c/0x20 [ 157.818323] [<00000000447183af>] ? __blkdev_put+0x840/0x840 [ 157.824108] [<00000000e559ec9b>] ? unlock_new_inode+0x69/0x140 [ 157.830152] [<0000000041c78db6>] ? unlock_new_inode+0xd0/0x140 [ 157.836195] [<0000000025cf7939>] blkdev_get+0x2e8/0x920 [ 157.841636] [<00000000af83a901>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 157.848392] [<00000000af459948>] ? bd_may_claim+0xd0/0xd0 [ 157.854005] [<000000006a16d4f0>] ? bd_acquire+0xf9/0x250 [ 157.859532] [<0000000004859e8e>] ? bd_acquire+0x12f/0x250 [ 157.865146] [<0000000073cdf5f5>] ? _raw_spin_unlock+0x2d/0x50 [ 157.871103] [<00000000e569f1e6>] blkdev_open+0x1aa/0x250 [ 157.876627] [<00000000c70c4310>] do_dentry_open+0x422/0xd20 [ 157.882412] [<0000000088599d43>] ? blkdev_get_by_dev+0x80/0x80 [ 157.888457] [<00000000e9cffb1e>] vfs_open+0x105/0x230 [ 157.893815] [<000000009d8a5e48>] ? may_open.isra.0+0x139/0x290 [ 157.899995] [<00000000de812449>] path_openat+0xbf5/0x2f60 [ 157.905669] [<000000009eafe318>] ? path_mountpoint+0x6d0/0x6d0 [ 157.911717] [<000000006ca3312a>] do_filp_open+0x1a1/0x280 [ 157.917329] [<000000006d3b1f92>] ? __alloc_fd+0x1d4/0x490 [ 157.923012] [<000000004d13adae>] ? may_open_dev+0xe0/0xe0 [ 157.928629] [<000000006d3b1f92>] ? __alloc_fd+0x1d4/0x490 [ 157.934240] [<0000000073cdf5f5>] ? _raw_spin_unlock+0x2d/0x50 [ 157.940268] [<000000006d3b1f92>] ? __alloc_fd+0x1d4/0x490 [ 157.946055] [<0000000078821c61>] do_sys_open+0x2f0/0x610 [ 157.951581] [<00000000ab5f5c63>] ? filp_open+0x70/0x70 [ 157.956931] [<0000000068a3efff>] ? __do_page_fault+0x545/0xa60 [ 157.963047] [<000000009ff1aa9c>] SyS_open+0x2d/0x40 [ 157.968138] [<00000000eec04c6e>] ? do_sys_open+0x610/0x610 [ 157.973834] [<00000000d4c734e2>] do_syscall_64+0x1ad/0x5c0 [ 157.979534] [<000000005077af3d>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 157.986445] [ 157.988119] Allocated by task 4377: [ 157.991737] save_stack_trace+0x16/0x20 [ 157.995700] kasan_kmalloc.part.0+0x62/0xf0 [ 158.000038] kasan_kmalloc+0xb7/0xd0 [ 158.003742] kmem_cache_alloc_trace+0x115/0x2d0 [ 158.008396] alloc_disk_node+0x50/0x3c0 [ 158.012354] alloc_disk+0x1b/0x20 [ 158.015791] loop_add+0x37e/0x7d0 [ 158.019229] loop_probe+0x154/0x180 [ 158.022841] kobj_lookup+0x221/0x410 [ 158.026543] get_gendisk+0x3c/0x2d0 [ 158.030168] __blkdev_get+0x356/0xeb0 [ 158.033953] blkdev_get+0x2e8/0x920 [ 158.037563] blkdev_open+0x1aa/0x250 [ 158.041262] do_dentry_open+0x422/0xd20 [ 158.045242] vfs_open+0x105/0x230 [ 158.048680] path_openat+0xbf5/0x2f60 [ 158.052475] do_filp_open+0x1a1/0x280 [ 158.056258] do_sys_open+0x2f0/0x610 [ 158.059957] SyS_open+0x2d/0x40 [ 158.063222] do_syscall_64+0x1ad/0x5c0 [ 158.067094] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 158.072178] [ 158.073789] Freed by task 8415: [ 158.077057] save_stack_trace+0x16/0x20 [ 158.081017] kasan_slab_free+0xb0/0x190 [ 158.085021] kfree+0xfc/0x310 [ 158.088112] disk_release+0x255/0x330 [ 158.091895] device_release+0x7d/0x220 [ 158.095902] kobject_put+0x150/0x260 [ 158.099601] put_disk+0x23/0x30 [ 158.102866] __blkdev_get+0x581/0xeb0 [ 158.106653] blkdev_get+0x2e8/0x920 [ 158.110263] blkdev_open+0x1aa/0x250 [ 158.114017] do_dentry_open+0x422/0xd20 [ 158.117976] vfs_open+0x105/0x230 [ 158.121461] path_openat+0xbf5/0x2f60 [ 158.125247] do_filp_open+0x1a1/0x280 [ 158.129029] do_sys_open+0x2f0/0x610 [ 158.132725] SyS_open+0x2d/0x40 [ 158.135988] do_syscall_64+0x1ad/0x5c0 [ 158.139864] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 158.144950] [ 158.146579] The buggy address belongs to the object at ffff8801a4061980 [ 158.146579] which belongs to the cache kmalloc-2048 of size 2048 [ 158.160172] The buggy address is located 1320 bytes inside of [ 158.160172] 2048-byte region [ffff8801a4061980, ffff8801a4062180) [ 158.172202] The buggy address belongs to the page: [ 158.177116] page:ffffea0006901800 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 158.187332] flags: 0x4000000000010200(slab|head) [ 158.192067] page dumped because: kasan: bad access detected [ 158.197755] [ 158.199379] Memory state around the buggy address: [ 158.204302] ffff8801a4061d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 158.211646] ffff8801a4061e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 158.218988] >ffff8801a4061e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 158.226332] ^ [ 158.230986] ffff8801a4061f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 158.238330] ffff8801a4061f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 158.245668] ================================================================== [ 158.253007] Disabling lock debugging due to kernel taint [ 158.258491] Kernel panic - not syncing: panic_on_warn set ... [ 158.258491] [ 158.265842] CPU: 1 PID: 8428 Comm: blkid Tainted: G B 4.9.190+ #2 [ 158.273186] ffff8801a075f628 ffffffff81b66c51 ffff8801a075f700 ffffffff82e40a77 [ 158.281239] 00000000ffffffff 0000000000000001 ffffffff81b38119 ffff8801a075f708 [ 158.289311] ffffffff813febaa 0000000041b58ab3 ffffffff82e32ab5 ffffffff813fe9d1 [ 158.297355] Call Trace: [ 158.299930] [<0000000077d8ecf7>] dump_stack+0xc1/0x120 [ 158.305323] [<000000003f107e7c>] ? get_disk+0xc9/0xe0 [ 158.310584] [<000000001082b66f>] panic+0x1d9/0x3bd [ 158.315586] [<0000000034cb6d1e>] ? add_taint.cold+0x16/0x16 [ 158.321375] [<00000000a518c51a>] kasan_end_report+0x47/0x4f [ 158.327159] [<00000000c059215e>] kasan_report.cold+0xa9/0x2ba [ 158.333118] [<0000000053f7de62>] __asan_report_load8_noabort+0x14/0x20 [ 158.339853] [<000000003f107e7c>] get_disk+0xc9/0xe0 [ 158.344943] [<00000000716e1783>] get_gendisk+0x171/0x2d0 [ 158.350463] [<0000000028bebc96>] __blkdev_get+0x356/0xeb0 [ 158.356074] [<0000000082607585>] ? debug_smp_processor_id+0x1c/0x20 [ 158.362549] [<00000000447183af>] ? __blkdev_put+0x840/0x840 [ 158.368379] [<00000000e559ec9b>] ? unlock_new_inode+0x69/0x140 [ 158.374437] [<0000000041c78db6>] ? unlock_new_inode+0xd0/0x140 [ 158.380479] [<0000000025cf7939>] blkdev_get+0x2e8/0x920 [ 158.385915] [<00000000af83a901>] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 158.392652] [<00000000af459948>] ? bd_may_claim+0xd0/0xd0 [ 158.398268] [<000000006a16d4f0>] ? bd_acquire+0xf9/0x250 [ 158.403791] [<0000000004859e8e>] ? bd_acquire+0x12f/0x250 [ 158.409404] [<0000000073cdf5f5>] ? _raw_spin_unlock+0x2d/0x50 [ 158.415362] [<00000000e569f1e6>] blkdev_open+0x1aa/0x250 [ 158.420886] [<00000000c70c4310>] do_dentry_open+0x422/0xd20 [ 158.426668] [<0000000088599d43>] ? blkdev_get_by_dev+0x80/0x80 [ 158.432768] [<00000000e9cffb1e>] vfs_open+0x105/0x230 [ 158.438639] [<000000009d8a5e48>] ? may_open.isra.0+0x139/0x290 [ 158.444686] [<00000000de812449>] path_openat+0xbf5/0x2f60 [ 158.450294] [<000000009eafe318>] ? path_mountpoint+0x6d0/0x6d0 [ 158.456334] [<000000006ca3312a>] do_filp_open+0x1a1/0x280 [ 158.461942] [<000000006d3b1f92>] ? __alloc_fd+0x1d4/0x490 [ 158.467555] [<000000004d13adae>] ? may_open_dev+0xe0/0xe0 [ 158.473165] [<000000006d3b1f92>] ? __alloc_fd+0x1d4/0x490 [ 158.478773] [<0000000073cdf5f5>] ? _raw_spin_unlock+0x2d/0x50 [ 158.484747] [<000000006d3b1f92>] ? __alloc_fd+0x1d4/0x490 [ 158.490359] [<0000000078821c61>] do_sys_open+0x2f0/0x610 [ 158.495936] [<00000000ab5f5c63>] ? filp_open+0x70/0x70 [ 158.501287] [<0000000068a3efff>] ? __do_page_fault+0x545/0xa60 [ 158.507331] [<000000009ff1aa9c>] SyS_open+0x2d/0x40 [ 158.512418] [<00000000eec04c6e>] ? do_sys_open+0x610/0x610 [ 158.518172] [<00000000d4c734e2>] do_syscall_64+0x1ad/0x5c0 [ 158.523871] [<000000005077af3d>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 158.531280] Kernel Offset: disabled [ 158.534899] Rebooting in 86400 seconds..