[....] Starting enhanced syslogd: rsyslogd[ 13.593491] audit: type=1400 audit(1575131590.354:4): avc: denied { syslog } for pid=1919 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.31' (ECDSA) to the list of known hosts. 2019/11/30 16:33:21 fuzzer started 2019/11/30 16:33:23 dialing manager at 10.128.0.26:35753 2019/11/30 16:33:23 syscalls: 1373 2019/11/30 16:33:23 code coverage: enabled 2019/11/30 16:33:23 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/11/30 16:33:23 extra coverage: extra coverage is not supported by the kernel 2019/11/30 16:33:23 setuid sandbox: enabled 2019/11/30 16:33:23 namespace sandbox: enabled 2019/11/30 16:33:23 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/30 16:33:23 fault injection: kernel does not have systematic fault injection support 2019/11/30 16:33:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/30 16:33:23 net packet injection: enabled 2019/11/30 16:33:23 net device setup: enabled 2019/11/30 16:33:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/30 16:33:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 16:34:01 executing program 0: ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x403c5404, &(0x7f0000000000)={{0x0, 0x2, 0x1, 0x1b9566abfc31bc4a, 0x7ff}, 0x3, 0x7}) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000080)=0x3) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0x9) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000140)) write$P9_RLCREATE(r0, &(0x7f0000000180)={0x18, 0xf, 0x2, {{0xe9, 0x0, 0x3}, 0x6}}, 0x18) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RCREATE(r2, &(0x7f0000000200)={0x18, 0x73, 0x2, {{0x24, 0x4}, 0x7ff}}, 0x18) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x400, 0x0) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000280)) ioctl$FIBMAP(r3, 0x1, &(0x7f00000002c0)=0x80) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000300)={0x73622a85, 0xa, 0x3}) write$selinux_attr(r2, &(0x7f0000000340)='system_u:object_r:initrc_exec_t:s0\x00', 0x23) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v1={0x1000000, [{0xffff, 0x4}]}, 0xc, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000440)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) flistxattr(r4, &(0x7f0000000480)=""/81, 0x51) r5 = open(&(0x7f0000000500)='./file0\x00', 0x800, 0x2) openat(r5, &(0x7f0000000540)='./file0/file0\x00', 0x40000, 0xc) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x4, 0x2, 0x4}}, 0x14) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/user\x00', 0x2, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/status\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40246608, &(0x7f0000000640)={0x5, 0x8, 0xfffffffffffffffa, 0xfffffffffffffffc, 0x15, 0x6}) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r7, 0x29, 0x30, &(0x7f00000006c0)={0x3, {{0xa, 0x4e20, 0x0, @loopback, 0x6}}, 0x1, 0x3, [{{0xa, 0xd4, 0x6, @mcast1, 0xa3}}, {{0xa, 0x4e20, 0x0, @remote, 0x2}}, {{0xa, 0x4e20, 0xfaa, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}]}, 0x20c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) sched_getscheduler(r8) r9 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000940)='/dev/keychord\x00', 0x20000, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000009c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r9, &(0x7f0000000e00)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x140434}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000a00)={0x390, r10, 0x2d82bbe90bc70641, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5f}]}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2e7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdbd}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7cbce008}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfffffffd, @mcast2, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @local, 0x4f9}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x390}, 0x1, 0x0, 0x0, 0x10000030}, 0x34000840) 16:34:01 executing program 5: clone(0x800c4800, &(0x7f0000000000)="b643de99e8eb4a18c61743c17aee7e4cd340bf6156595909c45b848a8cfac2c0cd0a3e9de286093af7e39e856448e0bbe0d26e7dc0c64fb01045238b3cd176c2797ef42950045920f6cbaf5a", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="c51121a1e7022ed44ea2bf28f735e9e26643f21a6598821fd12f1c8912b151") prctl$PR_CAPBSET_DROP(0x18, 0x10) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000140)={0x9}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1d) r1 = dup(0xffffffffffffffff) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1200}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r2, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x40081) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) faccessat(r0, &(0x7f0000000300)='./file0\x00', 0x1be, 0x1c80) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x141902, 0x0) ioctl$PPPIOCSPASS(r3, 0x40087447, &(0x7f0000000440)={0x6, &(0x7f0000000400)=[{0x2, 0x40, 0x4, 0x10000}, {0x3ff, 0x90, 0x80, 0x5}, {0x3, 0x7, 0x1f, 0x200}, {0xcd, 0x1, 0x42, 0x7}, {0xfff, 0x20, 0x80, 0x3}, {0x6, 0x4, 0x1, 0x1}]}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000480)) write$FUSE_LSEEK(r1, &(0x7f00000004c0)={0x18, 0xfffffffffffffffe, 0x2, {0x3}}, 0x18) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8982, &(0x7f0000000500)={0x7, 'hsr0\x00', {0x1ff}, 0x200}) r6 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000017c0)='/selinux/create\x00', 0x2, 0x0) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000001800)='trusted.overlay.upper\x00', &(0x7f0000001840)={0x0, 0xfb, 0xc5, 0xe225b914278c947a, 0x5, "a1165e7c59d543b3a199e994a03492c8", "0d7c430abfea03765c4842ef71169adbd072b813163a760a85ecb7fcecc5c13d4efa972522a42ec7ab736b5eace5fb72641da1acf52a0b6279e946dde3a43d08077dbe49e1d504f137b30ee19c18fc417d82a9c23c036a153f0f283e6cfb96aa5cd90092c0a2514050e37f240d97ef22e058d712a586e4abffb13e0c537addf4c6bc5f9fb33b4c7a30f944a16179bfb29721360f64fa3a0e974fba4809fcffd6d8e62d9bc1c9af66069e2b3d99d3d6f0"}, 0xc5, 0x2) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001940)='schedstat\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f0000001980)="9b0138ca117b67be2f6422bf1e1eed77", 0x10) r8 = dup(0xffffffffffffffff) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000001ac0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r8, &(0x7f0000001b80)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001b40)={&(0x7f0000001b00)={0x34, r9, 0x20, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x8, 0x8, @l2={'ib', 0x3a, 'syz_tun\x00'}}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x20044184) r10 = syz_open_dev$mice(&(0x7f0000001bc0)='/dev/input/mice\x00', 0x0, 0x0) write$selinux_create(r10, &(0x7f0000001c00)=@objname={'system_u:object_r:utempter_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x7f, 0x20, './file0\x00'}, 0x70) close(r10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001c80)={'syz1\x00', {0x7, 0xe71, 0x8000, 0xff}, 0x49, [0x10000, 0x80000001, 0xdbd, 0x7fffffff, 0x0, 0x6, 0x7fff, 0x78, 0x8, 0x8000, 0x3, 0xfff, 0x3, 0x8, 0x3ff, 0x1ff, 0x7fff, 0x9, 0xf9, 0x50, 0x383e, 0x3, 0x7, 0xcf, 0x3, 0x5, 0x8, 0x5, 0xd6, 0xd61, 0x200, 0x1f, 0x1, 0x101, 0xfffffffe, 0xdc82, 0x5, 0x7, 0x6, 0x8, 0xffffff01, 0x1f, 0xda7, 0x7fffffff, 0xffffff9b, 0x7, 0xf2a, 0xfffffffe, 0x4, 0xeaea, 0x8001, 0x0, 0x0, 0x1, 0x10001, 0x5, 0xe0, 0x40, 0x200, 0x8000, 0x200, 0x4fa, 0x2, 0x2b], [0xfffffffd, 0xff, 0x7b4, 0x9, 0x8000, 0x7, 0x138, 0xb87d, 0x4, 0x2, 0x6c, 0xfffff78d, 0xd1, 0x7b, 0x3, 0x5, 0x3, 0x10001, 0x7, 0x6, 0x1000, 0x5, 0x79, 0x100, 0x9b, 0x400, 0x0, 0x1bf2, 0x3, 0x9, 0x0, 0x200, 0x400, 0x4ba, 0x8, 0x0, 0xfffffffa, 0x7fff, 0xd6, 0x8, 0x81ef, 0xfffffe01, 0xf84, 0x3, 0x4, 0x7, 0x1, 0x401, 0x7fffffff, 0xfff, 0x6a1d, 0xfffffffb, 0x3f, 0x8, 0x0, 0x7, 0x1ff, 0x8, 0x0, 0x5915, 0x2, 0x99e, 0x1, 0x3], [0x4, 0x0, 0x7fff, 0x650, 0x0, 0x800, 0x7, 0x1ff, 0x4, 0x5, 0xf632, 0x5, 0x5, 0x8, 0x5, 0x6, 0x800, 0x0, 0x55b, 0x0, 0x6, 0x6, 0x1, 0xfffffff7, 0x2, 0x5, 0x5, 0x0, 0x3, 0x20, 0x101, 0x40, 0x6, 0xffff, 0x1000, 0xfffffff9, 0x3a, 0x0, 0x390, 0x2, 0x1, 0x3f, 0x8, 0x9, 0xb8, 0x81, 0x2, 0x21, 0xc1, 0xc2, 0xcd9f, 0x5, 0xc402, 0x7fffffff, 0x4b, 0x9, 0x4e04, 0x8001, 0x0, 0x0, 0xffff, 0x2, 0x8000, 0x9], [0x80, 0x8, 0x9, 0x9, 0x7fff, 0x1, 0x2, 0x6b9, 0x0, 0x0, 0x10001, 0x3, 0xffffff0c, 0x8a, 0x2, 0x1, 0xfff, 0xde, 0x3, 0x1000, 0x1, 0x4, 0x10001, 0xfffffffe, 0x80000000, 0x80000000, 0x8000, 0x6e, 0x8, 0x5, 0x9, 0x4, 0x5, 0x9, 0x7fff, 0x30, 0x0, 0x23, 0x2, 0x3, 0x1f, 0x7, 0xffffffff, 0x7, 0x0, 0x3a6, 0x40, 0x7, 0x5, 0x9, 0x6, 0xfffffff7, 0xd0000000, 0x3, 0x8, 0x80000001, 0x8, 0x1ff, 0x1ff, 0x5, 0x74, 0x3, 0x0, 0x3]}, 0x45c) 16:34:01 executing program 2: r0 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) keyctl$read(0xb, r0, &(0x7f00000000c0)=""/4096, 0x1000) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x8, &(0x7f00000010c0)={0xb511}) r2 = request_key(&(0x7f0000001140)='.dead\x00', &(0x7f0000001180)={'syz', 0x2}, &(0x7f00000011c0)='\x00', 0x0) keyctl$instantiate(0xc, r0, &(0x7f0000001100)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', 'syz'}, 0x19, r2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000001200)=""/103) connect$netlink(r3, &(0x7f0000001280)=@kern={0x10, 0x0, 0x0, 0x10000000}, 0xc) lgetxattr(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)=@random={'os2.', '^\x00'}, &(0x7f0000001340)=""/209, 0xd1) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001440)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000001480)={@rand_addr="c71003c340d4629c3b464d149d81227f", 0xfffffff9, 0x0, 0x3, 0x0, 0xbe39, 0x4}, 0x20) r5 = add_key(&(0x7f00000014c0)='.dead\x00', &(0x7f0000001500)={'syz', 0x2}, &(0x7f0000001540)="20e278f6cb6c1ead6a17a904adc2264823a60c3a11ab76a32105473e29b0f42576855c0dec9e8cea34c974aefd843e60b7f102f8292796e6cf677ba0bf4a7f97908af6ae2c3400a98922caef0c52837bc116dd70a61b8ea97919dba65edb00b695a5b9f631e1bd3666686d9701371c1b03b1a6a46b90f54ff824821335bca16f3960e6577632f1f49df84bb6b96995f8a0e55a3a82e87da71171e1e2bd9a9428af35c315dd577f6fecec4699ec7d8193e5a0fd1c6e3ed025710e6f9f4c5581d1080ab9b9fca1e39b0e20e5afa9e8f8be2fec0b8f3d046ba3a230ddd7a58c", 0xde, r2) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, r5) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000001640)='/selinux/member\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000001680)={'mangle\x00'}, &(0x7f0000001700)=0x54) r7 = fcntl$dupfd(r6, 0x0, 0xffffffffffffffff) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000001840)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r7, &(0x7f0000001900)={&(0x7f0000001800)={0x10, 0x0, 0x0, 0x80082991}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x1c, r8, 0x10, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x4) r9 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001940)='cpuset.mems\x00', 0x2, 0x0) r10 = dup2(r4, r9) r11 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001980)='/dev/uhid\x00', 0x2, 0x0) fsetxattr(r11, &(0x7f00000019c0)=@random={'user.', '#cgroupsystem\x00'}, &(0x7f0000001a00)='mangle\x00', 0x7, 0x2) r12 = socket$inet6_udplite(0xa, 0x2, 0x88) readahead(r12, 0x4041, 0x1) pipe(&(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001ac0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r13, &(0x7f0000001b80)={&(0x7f0000001a80), 0xc, &(0x7f0000001b40)={&(0x7f0000001b00)={0x14, r14, 0x400, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20008016) ioctl$TIOCVHANGUP(r10, 0x5437, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x2, &(0x7f0000001c00)={0x8, &(0x7f0000001bc0)=[{0x8, 0x81, 0x79, 0xffff12a2}, {0x37e7, 0x81, 0x3f, 0x21}, {0x6, 0xd3, 0x9, 0x1a}, {0xfff8, 0x3f, 0x9, 0x6}, {0x1f9, 0x40, 0x5, 0xfffff1d2}, {0x7fff, 0x9, 0x3, 0x5}, {0x539, 0xfa, 0x7}, {0x7, 0x40, 0x32, 0x10000}]}) 16:34:01 executing program 3: r0 = getuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, r0, r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x4daab083d0f941ff, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000100)={0x4341396aa56eccf2, @dev={0xac, 0x14, 0x14, 0x11}, 0x4e24, 0x3, 'ovf\x00', 0x8, 0x187, 0x5c}, 0x2c) r3 = socket$netlink(0x10, 0x3, 0xf6e6712d89f2ba1a) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000140)={0x0, 'eql\x00', {0x1}}) lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x1) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r4, 0x29, 0x45, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000300)=0x1e) r5 = accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14, 0x81000) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000480)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x34, r6}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000500)={0x3, &(0x7f00000004c0)=[{0x7, 0x46, 0x0, 0x8}, {0x8000, 0x8c, 0x6, 0x5b}, {0x100, 0x0, 0x2, 0x2}]}, 0x8) r7 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(r7, 0x127e, &(0x7f0000000580)) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/netfilter\x00') ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f0000000600)={0x2, 0x5, [@local, @empty, @random="0e011a4456aa", @empty, @broadcast]}) r9 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FS_IOC_RESVSP(r9, 0x402c5828, &(0x7f0000000680)={0x0, 0x0, 0x1, 0x2}) r10 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000740)='/dev/keychord\x00', 0x40, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000006c0)='.\x00', &(0x7f0000000700)='fuse\x00', 0x94000, &(0x7f00000008c0)={{'fd', 0x3d, r10}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r11}, 0x2c, {'group_id', 0x3d, r12}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}], [{@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.redirect\x00'}}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, '/selinux/checkreqprot\x00'}}]}}) r13 = request_key(&(0x7f00000009c0)='cifs.spnego\x00', &(0x7f0000000a00)={'syz', 0x2}, &(0x7f0000000a40)='/dev/keychord\x00', 0xfffffffffffffffc) r14 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x0}, &(0x7f0000000b00)='seclabel', 0xfffffffffffffffd) keyctl$negate(0xd, r13, 0x0, r14) r15 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/mls\x00', 0x0, 0x0) r16 = mmap$binder(&(0x7f0000feb000/0x12000)=nil, 0x12000, 0x1, 0x11, 0xffffffffffffffff, 0x100) r17 = mmap$binder(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x9) ioctl$BINDER_WRITE_READ(r15, 0xc0306201, &(0x7f0000000d00)={0x64, 0x0, &(0x7f0000000c40)=[@free_buffer={0x40086303, r16}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000b80)={@fda={0x66646185, 0x7, 0x2, 0xe}, @fda={0x66646185, 0x5, 0x1, 0xb}, @flat=@weak_handle={0x77682a85, 0x0, 0x2}}, &(0x7f0000000c00)={0x0, 0x20, 0x40}}, 0x400}, @free_buffer={0x40086303, r17}], 0x34, 0x0, &(0x7f0000000cc0)="12801fe6376af1fae4d4be5145cc171098ea21486d817c9f922242762630b1d074c062a5a154ab508c7cbf87a4907231a5e32bf9"}) 16:34:01 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x40) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x101000, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x1c00) r2 = syz_open_dev$binderN(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000200)=@v1={0x0, @aes128, 0x3, "18cf11e497526c77"}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = open$dir(&(0x7f0000000240)='./file1\x00', 0x400002, 0x40) futimesat(r4, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{0x77359400}, {0x77359400}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000340)={0x0, @nfc={0x27, 0x1, 0x0, 0x1}, @hci={0x1f, 0x0, 0x1}, @llc={0x1a, 0x324, 0x6, 0x0, 0x7, 0x9, @remote}, 0xaa, 0x0, 0x0, 0x0, 0xff81, &(0x7f0000000300)='vxcan1\x00', 0x8000, 0x5, 0x5}) connect(r5, &(0x7f00000003c0)=@hci={0x1f, r6}, 0x80) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r8 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000480)={0x101, 0x4, 0x658d5d653cbee9d1, 0xffffffffffffffff}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$binderN(&(0x7f00000004c0)='/dev/binder#\x00', 0x0, 0x802) r12 = openat(r0, &(0x7f0000000500)='./file1\x00', 0x40000, 0x80) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) poll(&(0x7f0000000540)=[{r7, 0x8}, {0xffffffffffffffff, 0x22a}, {r8, 0x80}, {r9, 0x8}, {r10, 0x201a}, {r11, 0x304}, {r3, 0x20}, {r12, 0x404}, {r13, 0x10000}], 0x9, 0x3f) r14 = openat$random(0xffffffffffffff9c, &(0x7f0000000800)='/dev/urandom\x00', 0x200000, 0x0) r15 = fcntl$getown(r4, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getgid() r18 = getpid() getresuid(&(0x7f00000008c0), &(0x7f0000000900)=0x0, &(0x7f0000000940)) getgroups(0x1, &(0x7f0000000980)=[0x0]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)=0x0) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000002180)={0x1, &(0x7f0000002140)=[{0x6, 0x2, 0x6, 0x8000}]}) r27 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/policy\x00', 0x0, 0x0) r28 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002200)='/proc/self/net/pfkey\x00', 0x80040, 0x0) r29 = memfd_create(&(0x7f0000003800)='/selinux/enforce\x00', 0x1) r30 = syz_open_dev$binderN(&(0x7f0000003840)='/dev/binder#\x00', 0x0, 0x0) r31 = socket$inet(0x2, 0xa, 0x7) sendmmsg$unix(r1, &(0x7f0000003dc0)=[{&(0x7f00000005c0)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000640)="9357b870541bf06c0a54977cd81f270dc80145f3ee98199babd7c1afe6ebf8cc4aa1eeffb10d9fcdd7f7cd6d5ed6ff422dd0e1797a5b8248fc6a2359368ddfcafe01f4f866963245d65acc611fff2af31da7", 0x52}, {&(0x7f00000006c0)="eeba8fa817567ba20edd6747c79882899dfbdafc67b90c15301c982fae7cd45f8203b09f6a4fed208b271592473cdaa295030d91f31458e44e11d3e464e04c544324c5144f98106ce44f18e14a95efbbc3a40f6b4e01f35fc1a2abe935bec4790e74b9237c28caf627574a0e205841fba98a8d75e7b16f1f0f5cc3c6155e812a7881ae97f25ad7ff38085608e096b8368bff5a757139b21f02bf69649358c4f28a0112efc145762484b67a4085f71d71bf79bdb127119b3af5f4674d18024fadee3b250e12f7176bf49129cd9f8f6e614ad0ad5892e862e0be5b1b27387539966ba7551190f73f", 0xe7}], 0x2, &(0x7f0000000c80)=[@rights={{0x10, 0x1, 0x1, [r14]}}, @cred={{0x18, 0x1, 0x2, {r15, r16, r17}}}, @cred={{0x18, 0x1, 0x2, {r18, r19, r20}}}, @cred={{0x18, 0x1, 0x2, {r21, 0xee01, r22}}}, @cred={{0x18, 0x1, 0x2, {r23, r24, r25}}}], 0x70, 0x4000010}, {&(0x7f0000000d00)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000000d80)="ee92863d436493078efac3dec9653f8f825921f1ff480069b6a807f90b95427bdf41c699450dbb8e1a574528dc16eaed33b54f2396261882d85445c67ea6ded511b77a174366a9efbc73826abd4b5cd728ef7b93a733c546260afaed1eae79cdfff29b9027f9c5681b864312bbcfa18506ea360599af44a9cde61e9e16d619cc2c90aa1f589f8fd3b42c8b2693049f138c55b721918520c2aa3a942f21db3a6c593bf76d63096d9bdf085c00020762285c1b919923edd461e7d2e0c05c22a2a2540a773babd60cdbcf66bf64bf141fd87308c0adc3b1ff76d99370338eb892099a7b4ae3f01e76f903078fd253bf6b115579106d065406bb89b6cec5d36b3d3243cc0f8115aef3e915d6e51ce59d54305a02e21f4daf49e21f6f4459cd8429e49eeea822e55f0aa315a0dec6be84a3b63402bdee633c3513d928779d69d7c0747ba89d0092b53575459f69a348a91f5f83a8a9d4ee439eb145c4541922f3d75c319d60b445c73585af8b9e53b210397bdfeeb4e1074c7d7be35b0b3b2f2d8f1b42b71248a1d4a438111afe20edc3c454f13ba2a237c39320fd82cb1a95f44e6fc1e4e8a08371447cddd1720a69b847e2c16accefac3af5be0872fa668108d3c24370dfad491b682728cd7762be39e328f9dde63eaa587d6f65b106d46ab805c9b9d3e95fe38d8eef681ab49a605b44f7093a71f47a8dbb508522901dd9fad48a38ca43c7b48872d99b551b8ad1447b7250b216c68dc68b3d01a5c9124e0382b3d9b14af211e621948bb97b734edb45a8c6c9d2b268c2cae2846b1f3eafcb2a7e5c521cf169f8af589b62224146980efa90e76467a56af727f58238b3b5543e0df10ae5ec39824a2dab09a31d7e62825ab6528f5ffd4631ec2eb684a9e8f48b19bca587f9eec3da98d22984e852191ac2d091daa86eb9567c8d56e17dc7cb99d50b6c52e508e1b250947fed8866f1cb775e3c7890d349b86b87d7bf90b8e38546d45dfaf3e872a311454b84b636238ed9ad7a75785c8dc5350e466b8d38d80510b8a4fc3fdd3a2b329cf0d899d90acc911f70f47ae4034f3829fd4ad6759bc79d3301a7d4fee8289a59e22293243c2330a6ca6467b589ea59ab7b1678ad73e6d07dc7eec29c99a15ba4c00a88266edcf5bc995f0da3105cfa27fbed0a2ce0e4df2311adc3d0debccee9133d73fe1add7ff76dc0234670b4390f6927f5ad84cb52c7a0687a1699530dfeda9f1e5109849810d429339c8264699df06270a1a84621485e7574bf07e9468d0c7d432e8cabc01b7a94eb3523d6b4c14ac7edc0128e966a6d926c5ea42f9c1cf7fa2926e72a1c7eb5414128a793f815e898107c3d4efd14bff1bd5709ce67f6252a71a1f15e6534893e024066ed866c5086b4e4c63ed091bfc2164d00c6d7500c665851fd2df74b5a473402715a28b5670b6d8e28798d76071078ec29802d0a9c07b38ebc7d8907fff0540ff4a7300c5349a49bf7fe67a18577ad821db0122723ded5b1919be0ad6406981a1a09060caa9574412b3795c9a5f8429a32ffc514dc954e6570d7ed1a950627508c2f42f17a30166ed2a5164a3b3475abb8494f8e2bf4f83928f61b04de66f640a2d654b2c7eded21d3bd5d4a5ac63a19bd16f0231963b14ce6500dea1b10dd3689e96db2ad4a2c0e580a0713376cfde3e57c7116e38b0d86ce0d1e7dcfd538d656cc241e54aaaf7d64f41c2664a27ac373d53e01b8051772ff97044fa41fee0389f5fc1e7bcf13662d0a1b0bbb822cc51affc0aff039d8ceff880f626b6830d0a37d532d318a2e23ead239639e404f16b5c2efa8a2f0725f5a9fd8c9ee97e4c1a4940705ca2dbf97140252e602f3d9c6b205ec7c910a80c82ad1ace116fed43a4853bf5892b117adb6a15484aaa3e3d2464da5f7e4446f7e0dbd5706be20dd46ea6b29c25eb20be92d0d0aefc169041079268824140d555291024ce0aea2eafe9512f5cba5a3a16c20f973e3f3a00390e2fd7b15bc50145bfec979f6a967694b76b73eec1123909130c6741f97dee1bcf357d380ef214847ebd70274d35bb26e981e8cdb3dd939915220d4bee649ecd12a64caffbe72fbb902fd05f050973efc28dc722f6429a7bfb920e063c518def5ecd083099bbefda011ee26959fa6b8509bcec10a76def9eb5c95f27cf5d8c7d5ff40994b285bb0154e0651eea4e069f7a9aed7d741b26cafad57b497baabefee900b8b2c303ccfb1f67936db25043340b439713d0245ee4606fa626ca32d4bd4001fa3ccbfeb0214daaeedafcbdfa6552d6f020d0352d297f89b335e17360c06c61876c6ca1240c767b6150adf1679f8b8a933dc6eb8a94d51f8a3d2585b2507afa83919aa7a54320701a6d8e98bbb1e99e80a25ab3191409393921eeeec029c4b3ccb1a825f8900691ee00925bf2f6eeb35484db1058f1aec01223ea949066bb7e7adb7cf361362886e25b225dc8a8ea87f1792edac94cf765f4760b68bb1fc1318008b9315758e10c70afb73a24f67df59823053c8cd56aa18015e019d8a9dcc0de5a5968464c8f87a12c2522daf1da1245fedf6d7d9140a6a2db5911ea4ddcce8af8fdd58256b47b2a658b7a9ae78e38d2a06fb44a2fdbc1284f25e52c94d4074e86276db13edcf155dced5d4fdef51544cd556ed0fece714118bef1bf55c171c17a4fd75b22c36d06421f6fbf8b19acd1d40f489a954caba9d17fdb8dd2cfda425c4e6ee81d31ffed9bad02c966d5b6e00cccac1280bd45c86517bcd5e026b3fe0ef6a1ab09ffdea9a503fcb32ed0875ff2acc8d48b70e740da27329d0a894745a5c5b0758201d39e2d0e193479c7dadb3525a71a2345bfc521853286d6c8c2394d3e201089398ef55f1c820d627b3510411af23a7a65484e6a2da555e42bfb3da71529c0fb92ead8dd5b9b40b22bc59e8237fcf16b7e8cc39f90c3fffd9826b241d60f191db11105a7e4ccf1bccb93e1713b98418df8b27156c70959f9b486796c5c5f9e4b3ebe3a7249916a2651c017f5f4070c76f82c29252a79ca9fd2feaa0753006035df33802b66c59139e0aeff458576a255f84ea681fcce5e988bd25fa4e7cc33ba0ce0196c21c30f991656fe2280ad53587ce816a7de71c00978cfe3abfb8ccd603bac10b523022238c716d4de3413db2a93a3049b1874bd1f9057e3bc93d0d55b06d237eecb8ec228852c850c9150454a919c10b3b2b079bf644b7c75dccafa4aa3602d43ca40f4606559749400574419c272a0e44ddcbbc22647f6b8670392410c4358d0c6109c34a7808008c76e1b7fcbb50ec361ec01fc30a6910b85a93319e250d7f5ed696cda85899fe11c9f5c0073b59701109fdcb2fe5bacaaa292e1328a79623880ebffd7ef5cb98ea8d924f8fccec42a9c124b46f7202a615e3a538bfea9584e57f56ba4a218fd8964d0a1b0dc820ee93d51036df86ba7ed2b17dd56c112a421fc87b5ecd16e72cf6921fc1f8b253f4f414e57e39064ed258041dc2049d2b503f51e50c52ebd9d390adc7b9bd17cc4dfb6e257e3aa989124a59f369e87a9f523fac7ffd6cc723bf3053e7621f6a0a3b7ca59618202c778d37b796d873a7f27cdb67c174f6654583911ff4bb7806bc5350090211b2463586b45bb6133f87c17b4d1010b8c59763aa3814b9f03385d2d8003631b258bed3655c93ce01d5359e20cdca665d9d70bdbb6a29fdc78c9b7826d38743035acced6ce012d28859f7904a3831e0257f80eacb79cdd0d568ac8d38fdde6d02bc32cf3cea869d4c7e3d59c1fc5ecc4670c85a2626e5f95d218c238f90247f2f3cb646ac3988dee52d1e239f3a63f0ddf01e9dce3857c95d61942696b3b56816a735acacf1ef77d2acdc5a778d0bb74b9b3a86ad13c9cb8c45c62f7df7dcfbe33b3c8c4f0497b125acf61982b95481c388299de26ab57e53edd3e2be1f259608ba92c1723cf38f87302100cd58ac9f287e8f0ea0970ded1ea6f5126f64f8685801f59f043b5ef5f7753a110e83722d8f831f9319c8f10d5f4e6fd0720299e109be43d32ce74569695d5704bf91ed58b904210f9c7b60e7781b9640d94cd4655ca154381a881acea7fe8e70b4cae2ce4a58f1162d7255546eaf8405d52803ee0389feec713cb3f2e0999e3a999a07a2b87ac5325bb3cb3e9907ce2990e0bd7d8f51d9d81380b91698832f0b826527f22788d5b557762f48e521868e34a8382f1fc2abe848f7676af104f8b8afa572b2e60b72cd973a843f069e981e0338b1bf26bd9ee19b91b9028b77db4b14fc4d964505ca15229c0eb2bfeecde4ad57c98b604a42a86f93e88aeb65181602879a84641ea1beb7055bb587398415f5e13e2bd82ecc6267a4b4cff1bbd14651c14904ba44dbc930b20317b30f41870d7ca8f068380c32de73bc5bf6d9edc2101f81964ed1e2030380cea889d368928064270678e67bae475412395b200d131c410e495cc1e6d8c93a7dd547aebae2c0becdf380918e78ca89296893f570ff53e539bcb39aeda92585f6a325666c763bcfccb9fa764e2a8fee82cd13cfa5eff65a461a1a000e95433d7d81a333fb55de0aa92a4cf37542966948b7a2ddb2d1c766895eaea0ad776216c73cd29e9231b58e13756e18dbafb81ed8d0bd43f85a1b6205f82fef18c407808b1624179b6adb397b7dd3fc4b774faa7bf4dfdd116c1f1148a77c7ee810e0c65d45ec808cafc9b7efb12b99cb4eafa77c2e616393fca3009989c613b47a7531704115b8eb4f3d2ebc2c40f7d12bcdc76328c4a928c34161fd6c7992d6ef9c93f21048c9bcace135b58a50e092553ff70f56d9aad436ea2d044f8408f51c45544130df50327d7715a9674b5161eb13282f754a81c0c96532eb5c76a024a840bb9789b602c6e302edc7437af76e1a906bee5f017c6a2b07282885be1b86eaa5f0d6fae8aa107e3bcbbfa3bb6f38291e5d0b247f32a3af20c1d8f3833e09a3b5ebbdb76726e387facb558ce8ad8d1eb31508a8d670d82ccbbd30cbf0334b3762835c71d88c6c883bd8df944a09c82b44c197239953231dcf032ba305a8b1a2ee7ef36116666b46155740676a2766300748314e49e5383c553c69d6bd9e66628934e683ccfa82973555bfbf4664f5500b2e34fbb8f003004b8bc402310b0df3c7dc7a2217918ed61b0bed5eb6bc3b4682841edd7561dfbf347cb919a8f29e495a9bac978f5dc0c9182858dc7e506a5dc0fa2333ecb196843fc01964ac271a929e1740e2848c09cd450d23539583d2031bfd168d62a4c5d602848315145dfa719a5f1378336a0fea8f2e2fa16c3acacd3eb829311bf6bd2cbf4a141b65a24702639b3252d33914646dedb4598412b7d42cde5350acd826366c33870927d556b2a4a9b92d0e42e714fc97772b423e5edb26e4516f417d7b63e282f2fa95589f0b68c1423b5794a90228792d78967beb470c3735953ec83733ad9fb6ef08179ec946cf8404eddc16eeca69b1d8ef994d1e806104a4c6c5559df93a4eeeaf5f29fdd196445812535bdf39c70998fe7d825c9d42d159ff28feade863b26adc9ecd1c0de0ca0b5e0111a976242ee5b373404ef0d6c90efa235a64c9b1b21ff032cadf8f313b39ecd800d4b2fbed595b7d52e8590140048cad4f4a2f43799de56b726f960d0d5f571f50a60cb70ed4f6a6b23a69aab5ec2307a0f917947eb3a96256102180e809824d74344269b1606cc78d5b2a93107dd494027997594a2bf9a9baf78fc3670a5372bb28233477020095f0e71d9309baa9786dee3d241d3547c82804cbfcdf3a1951fcb72e", 0x1000}, {&(0x7f0000001d80)="6acd82bd6974e6c16dfb44c9c3016cb0b6a01ea032c9ee9dbb214f31fe022c9e9d953652de4e775a74c608e2acfb35a10c3bd0afa2dcd3dd31334d9076d9cf98f8778b6dbe69badeab35712ae2656a0e40b01f71da91a3e7bf6b6f140529cb1c9143ced5643e2e14f0973d67e5e0fbec8319d5c982d75996087dba8fb98870f884e583d60ec32cf42aefd84c6077fd1f65697019c5d42457961a836b551da1305921b1f5f4b5eb82c137de8523c6", 0xae}, {&(0x7f0000001e40)="94f00cd51641444ae4d1b8226f70fc0414bf170a45b3d5ba19d2b3f45bcd5d8787592b726a769409dd614887baacdfaeccadd6f5a551caae1949bdaca7498b60fb078b46310b3d24b862fd1d6cc58a6f119567bcf42efb30d67ebc0143bd8a50b1d0e6589cc7bafb825fb2b7775af1c26d744a7e861a9b75e258bc65850c5374f448dafc987c859d5bda057a232677df6a16f694f44b145aad97301268d464f19783f42e00a4117354379aa410dd01892bf82ba81026e2aff79e1cb3bb19d334300c14a4e842", 0xc6}, {&(0x7f0000001f40)="8608d097b9ea85", 0x7}, {&(0x7f0000001f80)="2a877c205b5d1bb4c907772058ade3546c531b3f4885cf1213690ffc9ce7c50e5c962e247f94c86bce07877ece263dbed5bec04a84d2e055a951ab842a06e3e1e39f243c68a4489a69d48f612fcef34e48467e9fadba", 0x56}, {&(0x7f0000002000)="e2b529dad96fb32db26f02415927918c0157924b213c44e30205a8e9ffbf5575ba7b403212367135fc1d2e44c5b27a919b1f6fecc621b7e7a5fdb148a40ac025b2a32a52de0cfa7a691a9b4efefcf60b01a3549b7d65030ee6906e0e310a7cf0dc880de964dc666d055225fe0a4a172997596d40086ee2f3742e65665765c6d238163e327354ed6815c2120cb71efa9b10c194a2a8cc2af596ade203ff289c1fdf5ab6696a83eb631b43b7e2f9e9", 0xae}, {&(0x7f00000020c0)="38c5265580", 0x5}], 0x7, &(0x7f0000002240)=[@rights={{0x18, 0x1, 0x1, [r26, r27, r28]}}], 0x18, 0x4000081}, {&(0x7f0000002280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000023c0)=[{&(0x7f0000002300)="064efcac011a924bf335875209051dc5c47cae2e31b1b4fc1630f9cf85c6dfc884e21b477142d4231f0c8776416812157ed5ea02972483acdd2cfc9a7ab8ca1b58ff1cf3102bb2ab0a7e65f0fd2378af4784b1b8e1522048535ba960b03f8757eeb7233a68e809f1ef2397784277de60086784ef21c87fd56f2bd6226f5f3be413660990c367", 0x86}], 0x1, 0x0, 0x0, 0x4048000}, {&(0x7f0000002400)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000003600)=[{&(0x7f0000002480)="552a7d18303d4c15d07e12bf5becd901fa62fe90061bd749a26238a51bac5354c35580027ca5e701b0c6e22ee52e0c5c8aae6d584acfb1a0894020c3b867cb0a5def8fc200d756faed355e908ad4d7fd0999fa25c02a0712552db4822e5f991ab70ca9", 0x63}, {&(0x7f0000002500)="5950ccb576899ae631928436adffd8f1bbecefba190a99c01e2e34c7cc9b49b70502abacb2a90c5bb0e7aa7963c6f377fb25727b3a2872b8a006e1d11deb04225e3730d4f33f7da040d385094b2c735d8c375dae099a3f47", 0x58}, {&(0x7f0000002580)="9f7a9bfa3f63251fb5a7873d91db9902a45f0e8ea18c56d0d4d3b80446a53919adbb1545fcfdd416a3ca1dbb916275d715499d01671a0231427f4054cfd7ac6aaa391d338718b185d6059fea5ed428fbae98bd219e20408afee47817c0b2ab3910a030045a083f5e6475455c3aa7ef6584e9", 0x72}, {&(0x7f0000002600)="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", 0x1000}], 0x4, 0x0, 0x0, 0x40}, {&(0x7f0000003640)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000037c0)=[{&(0x7f00000036c0)="154ba72d73c0b95a3dd84f0d7f5ca9dd59ddabcbe7a012da81bfcdebcc36856ea76356d3300856a6ac6b02a6911634f70246092d0f147bf55f0c5bafea2f99c25833f922a5318c12b64a3938d5fcf3ac570b6a89b73b46c5b1f6c96608e750b019a10bdbd8", 0x65}, {&(0x7f0000003740)="e43dbeb4a15d87b13cd2b4201aa8e5dd55a2d364bb3550c3227540422015f8f7722bbec6d998d59352222fb0a78bcdba340361e374263d0a180be0dc995779fc5e60", 0x42}], 0x2, &(0x7f0000003880)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r8, r29, r30, r31]}}], 0x20, 0x90}, {&(0x7f00000038c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000003d80)=[{&(0x7f0000003940)="27e13d7a1da8a50f33d6cd43203a8672a99123eb446f5a1fb7a5a3f6400a14e232967c14a1d65341a7f2f8edfbf8681750a7d8d3b5eac6b99543dc70a2bc896d8e43ccb8c72b9216b1f86ceb0f34c4829907d4e7ae532ebb3971e7a5e274b413c4d4e935bb2916f954dba40f06efc0d2fd3e648f19a3d2fe2f94c76020b8edf9d1a2fc9e9f56cf0cfbfed7533d167f93af568b541184579c9b141751", 0x9c}, {&(0x7f0000003a00)="51b1c0c5e13682c581b360c6ba860a8f43025a2cdf482d94812c52cf9e25fb17d02b305347ca4d8e030e06c83d4d640ce7c140639ee47f5a608dfb590cecdb7895ca85dbb095e8f3c572dbfd4a691c0d1d33225b0df6f48d18c72c43068df1e975e13dc0ecffaf943c9e97c47f16771a56d514e75c1d", 0x76}, {&(0x7f0000003a80)="2ceedae5f1639a03da5d049b3bf90d608113971ad9c903f3cab95acb6ea6ed345ead7760ce4a37e0b20ea04772e9e303d2d1d29a6d72fef9068b3da7425b0ad44967fdd2015adcf2f559c02f2586a33c3b961bc4ffbf1f7ffb65e7c3b67af701c68b6012b76a46940206940a3c85a6798f45c8be6267c21b08e51df2feabb17ef72a9899ac700fa138e1e39d0b5cbd90719807c3a9457aff08ed068a922d4b2c899bb077d327156a1c70a26ec486ec482289d981daf7af37ead415309d6c", 0xbe}, {&(0x7f0000003b40)="44568c60c3a54f08d7395b100f3e203926d0ed5e0e0a293c555295e49949d7399919086274fceab68b9b586b5743db62b8d4be2aaf37d1e745a0df83866a0afb83780eb35cd918d93c7d43a8850dba093458698d435cae5b214a4e8876bcf03782566bd79dd0ca09d1bef52c96efcbb7a204dd2f3ea2e3acbdd1de9bcc6d5c0c927e139cc90e25da43065b4fe86a3eaa16ab1d0d87cd85831945049e7fa65ae1de8c5bcf14a252167879899a0abb9ef4be785b0b1f81963bdbd94af4023f", 0xbe}, {&(0x7f0000003c00)="b56b7aecd4505ed49ee41d90c162776415a7cd70f2a8a80dc991f13a17f702593ee9375d583fd4f222c1b4a927a0072eaab76794fa12a88000bc1297841bdceae9fa3ac8f180d9e672b4876d791bf1959794a2df5654a6932c4bdf68acda3450780afdd460bce902378817", 0x6b}, {&(0x7f0000003c80)="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", 0xfd}], 0x6, 0x0, 0x0, 0x8}], 0x6, 0x4000000) 16:34:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xfffffffc, 0x212000) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/253) r1 = dup(0xffffffffffffffff) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x80000, 0x6) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-', 0x7}, 0x28, 0x2) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000200)={{0xa, 0x4e20, 0x4, @rand_addr="aff5069b4192e63b7b14249f9168ccbf", 0x8}, {0xa, 0x4e21, 0x2, @mcast1, 0x6}, 0xffff, [0x5, 0x7f, 0xee, 0xcd, 0x7, 0x6, 0xfffffffd, 0x401]}, 0x5c) open(&(0x7f0000000280)='./file0\x00', 0x5fd15e84758bcbf3, 0x82) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40246608, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x9, 0x7, 0x9}) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x1) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000340)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/context\x00', 0x2, 0x0) fcntl$getown(r4, 0x9) r5 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x80000) setsockopt$inet6_group_source_req(r5, 0x29, 0x2c, &(0x7f0000000440)={0x8b67, {{0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1637}}, {{0xa, 0x4e20, 0xfffffffa, @ipv4={[], [], @multicast1}, 0x200}}}, 0x104) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKFRASET(r6, 0x1264, &(0x7f00000005c0)=0x7fff) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x30021000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x20, r8, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x946}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x8000010) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pwritev(r9, &(0x7f0000000900)=[{&(0x7f0000000780)="28ea49cafbf1ddfbd5b7c92f54a9c2ca7c23267aa3557464242af63e9f9b7a8a37fa68c3ff3b", 0x26}, {&(0x7f00000007c0)="a41b771a5d2a35cc5368b3f0ca3f3c5a0fa275b154c90067dfaa4d03bd278c5cf972ef7c9f38242880188afa", 0x2c}, {&(0x7f0000000800)="bd0fd96c090b7d44c58c5113fbf587f5f7fb2b3581b30642038475eaec82ea6576906b7b4558d66cb7d6ed9d719cc2fc17cc98", 0x33}, {&(0x7f0000000840)="45cae5b0cfec77f7b53be5109428c1f4ff36e25a", 0x14}, {&(0x7f0000000880)="e5f13b537e819f0bd86c3d51c24d103ceb9d7e930a9835fe834bd1f73cef560eefe90553f8e77107da92c8af1173227c4bd941b3b05583d6d8ffe1024dc3c5ae946606a6132c8c3539ec85deb99d81b1c82dc87cdba00b18f4", 0x59}], 0x5, 0x9d) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000980)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e23, @local}, {0x2, 0x4e22, @multicast1}, 0x196, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000940)='lapb0\x00', 0x3f, 0x5, 0x9}) r10 = accept4$packet(0xffffffffffffffff, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14, 0x800) sendfile(r10, r1, 0x0, 0x401) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000ac0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r11, &(0x7f0000000cc0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0xab7e61f24f4397f0}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b00)={0x168, r12, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_BEARER={0xf8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1f, @remote, 0x1ff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xffffff00, @loopback, 0x9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3b3a}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3d1f04af, @ipv4={[], [], @remote}, 0x81}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'gre0\x00'}}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x5da9b05d29be48d5}, 0x800) r13 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) fcntl$getown(r13, 0x9) 16:34:02 executing program 3: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000080)=""/4096, 0xc31) clone(0x0, &(0x7f0000000140), 0x0, 0x0, 0x0) pipe(&(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000800)="60cda4da57d6ef5ded5c43f5711310256779d75ebfbf25f4acacb6e732c347ecf1274a820a93b33fa9bbcf039cce88d5e487a3d31008411e1fdc891ba83ef232a613241369437c34a9bb7922372fa030797d437abb3fa7548be8565a18dbafa15c62411426e3a2df4113cc8d35baaed369d21917cbf994efc24beb71fb1b7e78c7087892e933d039bd8b12356003148d0048554356a226dc9773fdf1317412e10ada29a06744f31ef74aade8f0b80b7790d41726e69e2b422b28a428de5c4dcb8665ee4861920cf00e6d208fbd62dac4cb2fc78a53d1321bcd347f8f59c7a5efca57c15cf5948a6e50791d3bbfffbe541f1032605f956841d2c6a6cd7b1d9210d00b18a206a69ed836d7618d8e97", 0x10e) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r2, r3, 0x0, 0x80000001) r4 = open(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x4c01) faccessat(r4, 0x0, 0x0, 0x900) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) clock_gettime(0x0, &(0x7f00000011c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000001200)={{}, {r5, r6/1000+30000}}) r7 = add_key$user(&(0x7f0000001100)='user\x00', &(0x7f0000001140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) geteuid() r8 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000980)=@v3={0x3000000, [{0xffffffff, 0x8}, {0x8}], r9}, 0x18, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000001080)={'syz', 0x0}, 0x0, 0x0, r8) r10 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r10, 0x0) keyctl$describe(0x6, r10, 0x0, 0x0) r11 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r11, 0x0) keyctl$describe(0x6, r11, 0x0, 0x0) keyctl$reject(0x13, r10, 0x9, 0x4, r11) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000980)=@v3={0x3000000, [{0xffffffff, 0x8}, {0x8}], r12}, 0x18, 0x0) r13 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r13, 0x0) keyctl$describe(0x6, r13, 0x0, 0x0) r14 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r14, 0x0) keyctl$describe(0x6, r14, 0x0, 0x0) keyctl$reject(0x13, r13, 0x9, 0x4, r14) request_key(&(0x7f00000013c0)='big_key\x00', &(0x7f0000001440)={'syz', 0x2}, &(0x7f0000001480)='\x00', r14) add_key(&(0x7f00000014c0)='cifs.idmap\x00', &(0x7f0000001500)={'syz', 0x0}, &(0x7f0000001540)="eb92c3ebc8607bebb892bcbf295302a467b02c685d42247c3609fffc7585ced230e8bbd295839e5e8f7d9a5e42792276894599d74bd018a4143d6e8bb823d9f55b96271fae6864af5d249034d0a3d81ffddf3d2b28ef023e16ba2fc86dffd65139abe9e8c5ba39b6bdef5310d242646e71211ba538256913c2b4002811b3ace8acd5430c79fcb94391d05321990d1edc5aa3bca2cfa3260fbdb6de7e5d4153a72701ace6a10f6a13feb91106c844fa2837bfda102ef9ddf5d8919c9608f473d05c507068562b91b1d1d7b8d86f0d9afc6894297d77f200c30480a800973c5f", 0xdf, 0xfffffffffffffffb) r15 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r15, 0x0) keyctl$describe(0x6, r15, 0x0, 0x0) r16 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r16, 0x0) keyctl$describe(0x6, r16, 0x0, 0x0) keyctl$reject(0x13, r15, 0x9, 0x4, r16) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)='security.capability\x00', &(0x7f0000000980)=@v3={0x3000000, [{0xffffffff, 0x8}, {0x8}], r17}, 0x18, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001640)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001740)=0xe8) keyctl$get_persistent(0x16, r18, r16) add_key$keyring(&(0x7f0000001240)='keyring\x00', &(0x7f0000001280)={'\x9f\x00', 0x0}, 0x0, 0x0, r7) connect(r0, 0x0, 0xd413a8e7e4fd9693) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r22 = geteuid() add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, r22, 0x0) keyctl$search(0xa, r21, &(0x7f0000001400)='\x00\x00\x00\x00\x8e\xb3\xcc\xd0t/.id\xb7\xf8\xd6r', &(0x7f0000001180)={'\x00', 0x0}, r21) writev(0xffffffffffffffff, &(0x7f0000001240), 0x0) mknod$loop(0x0, 0x1201, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCINQ(r19, 0x541b, 0x0) write(r20, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f00000012c0)=""/250, 0xfa) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) read(r19, &(0x7f0000000200)=""/250, 0x50c7e3e3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sigaltstack(&(0x7f0000952000/0x1000)=nil, &(0x7f00000010c0)) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$VT_ACTIVATE(r20, 0x5606, 0x3) syzkaller login: [ 65.910294] audit: type=1400 audit(1575131642.674:5): avc: denied { create } for pid=2270 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:34:02 executing program 3: memfd_create(0x0, 0x1) pipe(0x0) getrlimit(0x8, &(0x7f0000000380)) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$lock(0xffffffffffffffff, 0x27, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) keyctl$session_to_parent(0x12) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10080801}, 0x40) fstat(0xffffffffffffffff, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4}, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x7) r3 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0) getgid() write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[@ANYRESDEC], 0x14) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) [ 65.983334] audit: type=1400 audit(1575131642.744:6): avc: denied { write } for pid=2270 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 66.053524] audit: type=1400 audit(1575131642.814:7): avc: denied { read } for pid=2270 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:34:03 executing program 2: socket$inet(0x10, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/rt_acct\x00') r0 = socket(0x4, 0x3, 0x3f) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'ip6tnl0\x00'}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) dup(r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xb) capset(&(0x7f0000000000)={0x20071026, r1}, &(0x7f0000000040)={0x0, 0x5, 0xfffffffffffffffe, 0x0, 0x3f, 0x1}) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r2, 0x0, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x1604bfae) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) r5 = syz_open_pts(r4, 0x0) ioctl$TCFLSH(r5, 0x540b, 0x2) read(r5, &(0x7f0000000200)=""/234, 0xffffffffffffff42) r6 = creat(&(0x7f0000000400)='./file0\x00', 0x0) openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000080)=0x80, 0x12) r7 = syz_open_procfs(r1, &(0x7f0000000000)='@\xc9gemap\x00') r8 = memfd_create(&(0x7f0000000040)='/dev/loop#\x00', 0x0) sendfile(r8, r7, 0x0, 0x2000005) read(r8, &(0x7f00000005c0)=""/193, 0xc1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r9 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) r10 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r11 = socket$unix(0x1, 0x1, 0x0) lseek(r9, 0x100000000000000, 0x2) sendfile(r9, r10, 0x0, 0xfffffffffffffffc) sendfile(r9, r10, &(0x7f0000000040), 0x8000fffffffe) getsockopt$sock_buf(r11, 0x1, 0x10000000000001e, &(0x7f0000000380)=""/87, &(0x7f00000006c0)=0x9) mkdirat(0xffffffffffffffff, 0x0, 0x180) syz_open_procfs(0x0, 0x0) 16:34:03 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @mcast2}, 0x1c) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@local, @ipv4={[], [], @local}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000, 0xa1, 0x400, 0x880, 0x6, 0x10, r3}) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f00000001c0)) 16:34:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006, 0x0, 0xff}]}, 0x8) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) write(r2, &(0x7f0000000080)="7b32bd8d8e76ff4cd911c04b640aee046ae999c0a5847982fe1f8e90261378fbdd725ce9705b190f77e40e37ff9907efb66f7eace7cdfa7b581e9bd6bed5d89e5dcf34883b47f656ebe292776a4d7e316b9baba9e6e5b16f05fa9cc03d1b956bf8d8339488283c8248fc4be69bf6dae2a2cb240f62", 0x75) sendmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 66.307296] binder: 2320:2322 ioctl 800c6613 20000200 returned -22 [ 66.376414] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) [ 66.394078] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure 16:34:03 executing program 0: creat(0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) poll(&(0x7f00000004c0)=[{r2}], 0x1, 0xa4) r3 = syz_open_pts(r2, 0x1) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000080)=0x9) r6 = syz_open_pts(r5, 0x0) ioctl$TCFLSH(r6, 0x540b, 0x2) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000080)=0x9) r8 = syz_open_pts(r7, 0x0) ioctl$TCFLSH(r8, 0x540b, 0x2) dup3(r3, r8, 0x0) syncfs(r2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f00000001c0), 0xfffffef3) read(r9, &(0x7f0000000200)=""/250, 0x50c7e5e2) openat$cgroup_subtree(r10, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_ADD(r10, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(0x0, 0x25) ptrace$setsig(0x4203, r12, 0x80000001, &(0x7f0000000100)={0x3d, 0x0, 0x851d}) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="747275737465ed852c032285c8736f6fa80cee1c03bd6c7d716c00"], &(0x7f00000000c0)=""/28, 0x1c) r13 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r13, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r13, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(r13, r14, 0x0, 0x88001) ioctl$UI_SET_EVBIT(r14, 0x40045564, 0x14) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r16, &(0x7f00000001c0), 0xfffffef3) read(r15, &(0x7f0000000200)=""/250, 0x50c7e5e2) openat$cgroup_subtree(r16, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_ADD(r16, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r17) 16:34:03 executing program 4: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x6, &(0x7f0000000000)={0x0}) [ 66.431893] binder: 2320:2338 ioctl 800c6613 20000200 returned -22 16:34:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) bind$inet6(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x800) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0x7, 0x7b, 0x1}, 0xfffffffffffffe93) syncfs(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 16:34:03 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x200, 0x70bd26, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200040c4}, 0x40000) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r2 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000500)={0x34, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1163484000000000000000000000000000000000000000000000000000000000000000000000000000000000faffffffffffffff"], 0x0, 0x0, 0x0}) 16:34:03 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0xa0800, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x8000}) fchdir(0xffffffffffffffff) r1 = socket(0x10, 0x0, 0x0) write(r1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$nbd(0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"/536]) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) [ 67.082280] audit: type=1400 audit(1575131643.844:8): avc: denied { set_context_mgr } for pid=2368 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 16:34:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'broute\x00', 0x0, 0x4, 0x5c, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000280)=""/92}, &(0x7f0000000140)=0x50) add_key(0x0, 0x0, &(0x7f0000000300)="91dd8c9b559f53f05117c86f98cabf23930b14d2a1d7b3f113a65ee844025adf6edcf10893adbc5ee51e90c32fd64a14bce2d2426ca1c65171c78a1995b255fda18a09bd50705a9f784ef155974b", 0xd, r1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x32080, 0x0) timerfd_settime(r2, 0x1, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, &(0x7f00000000c0)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_dump={0x30}}) 16:34:03 executing program 3: ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000700)=""/244) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0x8000) r2 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0xfffffffffffffffc) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@loopback, @in=@dev}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') lstat(&(0x7f0000000080)='./bus\x00', 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)={0x2, 0x1, 0x0, 0x7, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) recvmmsg(r3, 0x0, 0x0, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000580)={'sit0\x00', 0xa515}) fchownat(r1, &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, 0x1800) sendfile(r1, r2, &(0x7f0000000040), 0x8000fffffffe) 16:34:04 executing program 2: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(r0, r1, 0x0, 0x88001) sendmmsg(r0, &(0x7f0000005780), 0x4000000000000d2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$sock_timeval(r2, 0x1, 0x1b, 0x0, 0xffffffffffffffc8) listen(r2, 0x80) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x402600, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@empty, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xfffffffffffffe72) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400204) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r7, 0x0, 0x48b, &(0x7f0000000100)={0x3, 'nlmon0\x00', 0x3}, 0x18) write(r7, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r9, &(0x7f0000000040)=ANY=[], 0x7c774aac) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x3}, 0x28, 0x1) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r9, 0x0) 16:34:04 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\\ppp1cpuset\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @multicast1}, &(0x7f0000000180)=0x84bb7672304e181f) lseek(r0, 0x12, 0x0) 16:34:04 executing program 4: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r0, r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) splice(0xffffffffffffffff, &(0x7f0000000400), r1, &(0x7f0000000440), 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r1) r4 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000004c0)={@rand_addr="09de87b835b602cafe810d101fb48d9f", 0x71}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/context\x00', 0x2, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000240)={0xf736, 0x7f, 0x7, 0x7, 0x11, 0x3, 0xc0000000000000, 0x7fff00000000}) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fcntl$getflags(0xffffffffffffffff, 0x401) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') write$P9_RSTATu(r4, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000680)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0x4, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x1) write$binfmt_script(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x13b) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 16:34:04 executing program 0: creat(0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) poll(&(0x7f00000004c0)=[{r2}], 0x1, 0xa4) r3 = syz_open_pts(r2, 0x1) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000080)=0x9) r6 = syz_open_pts(r5, 0x0) ioctl$TCFLSH(r6, 0x540b, 0x2) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000080)=0x9) r8 = syz_open_pts(r7, 0x0) ioctl$TCFLSH(r8, 0x540b, 0x2) dup3(r3, r8, 0x0) syncfs(r2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f00000001c0), 0xfffffef3) read(r9, &(0x7f0000000200)=""/250, 0x50c7e5e2) openat$cgroup_subtree(r10, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_ADD(r10, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(0x0, 0x25) ptrace$setsig(0x4203, r12, 0x80000001, &(0x7f0000000100)={0x3d, 0x0, 0x851d}) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="747275737465ed852c032285c8736f6fa80cee1c03bd6c7d716c00"], &(0x7f00000000c0)=""/28, 0x1c) r13 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r13, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r13, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') sendfile(r13, r14, 0x0, 0x88001) ioctl$UI_SET_EVBIT(r14, 0x40045564, 0x14) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r16, &(0x7f00000001c0), 0xfffffef3) read(r15, &(0x7f0000000200)=""/250, 0x50c7e5e2) openat$cgroup_subtree(r16, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_ADD(r16, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r17) 16:34:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x4, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f00000002c0)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x100000], [0x3, 0x7fff, 0xffff8ed7, 0x5, 0x8, 0x5]}}) 16:34:04 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f00000004c0)="edd1ee300974950e7def2f5ac6a254e3f205b27917dcba31577971a9d8870bf0aa99ea66c36a80b0448deaa920767968000bd61d160c1377f50305a2908a7e2d83c6177830886ea18a0577d43ff9a901e37502abd16d8afb9ffbc854d5584716d2f23f2e8833b335e4302cdd641e904c9a50220801d1e39d2e40ab08e875178356a7b74c584b5faa19d8382e42b827cf7e3910cf6b4ce29b924296e2cfaff0916e2b8d17477493cc990a2429fb175d6ebccd2eb1172f953e6d87266c0c46466cb2dd7b8d3fecf4cf2f71f37d8b34c8d17561a73672f27e75c8fe3da4258fb779938fb5be0e6200000000") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r2, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0x27c}], 0x1, &(0x7f0000003780)=""/232, 0x1fb}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r3+30000000}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r4, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x40087708, &(0x7f00000002c0)='\x00\x00@\x01\x00\x00\x00#,\x04>\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x81;\xcb{\xb0\xd6\x1e\x00\x00\x00Q\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\xe6\x9c\xef!\xe2\xa2p\xf0\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oc\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff') ioctl$ASHMEM_SET_NAME(r4, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r4, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') readahead(r4, 0x0, 0x3ff) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r5 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000180)=@buf={0x0, &(0x7f0000000740)="1bff0fa768fb11fc601e661724e8dec471314a52fadf2c8dc470cd6fe8051931e44abfe08cd824fe94a7feaadc9ddde59538cdb13755cd6a518be781269aa553c2c044429525539e9d1e8ce901cd95e68232725dda29"}) io_setup(0x0, &(0x7f00000000c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet(0x2, 0x3, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="fcc1f1b843171ac153144cde3334eccc", 0xffffffffffffff32) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000001c0)=0x7) write(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 16:34:04 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x80010000}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000240)=@ccm_128={{0x304}, "6156c9f8d7bef72e", "00dd2215349c52281b427cef61db9864", "db9ea49f", "1d39aeb5a8370320"}, 0x28) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x400) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000800)="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", 0x10e) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r8, r9, 0x0, 0x80000001) write$cgroup_subtree(r9, &(0x7f00000001c0)={[{0x2d, 'memory'}]}, 0x8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000340)={0x0, @empty, @empty}, &(0x7f0000000280)=0xfffffffffffffdbf) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r10], 0x17) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200), 0xc, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="babf18a03412a38ba3a2ebec9ec01ee1f7cbc9aa670f227592459fcf01476edb6dbeef58311b79ed524caaf3cb1e4450e3f74a9faca3c34c81a31158d8f2877f3f80f3cd8016102339354c41ce04dc3c39229b630000"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x200005, 0xe) 16:34:05 executing program 3: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) write$selinux_access(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e00010000000000007374656d5f753a73797374656d5f723a6b65726e656c5f743a733020303030303030303030303030303030303030303000"], 0x61) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x22fe) [ 68.216790] syz-executor.3 (2384) used greatest stack depth: 24416 bytes left 16:34:05 executing program 3: socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000140)={0x80000001, 0x7f, [0x80, 0x800, 0x0, 0x28], 0x9d2}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x8002, 0x0) recvmmsg(r2, &(0x7f0000000900)=[{{&(0x7f0000000440)=@generic, 0x80, &(0x7f0000000640)=[{&(0x7f0000000700)=""/148, 0x94}, {&(0x7f00000007c0)=""/221, 0xdd}, {&(0x7f00000003c0)=""/59, 0x3b}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f00000008c0)=""/32, 0x20}, 0x8000}], 0x1, 0x20, &(0x7f0000000940)) linkat(r0, 0x0, r1, &(0x7f00000006c0)='./file0/file0\x00', 0x1400) fchdir(0xffffffffffffffff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000400)) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000500)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) fchdir(r3) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000380)) r4 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f0000000340)='./bus\x00', 0xa00) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x800000000000) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000004c0)) r6 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000001a80)={{{@in=@initdev, @in6=@remote}}, {{@in=@multicast1}}}, 0x0) ioctl$PPPIOCSFLAGS1(r5, 0x40047459, &(0x7f00000000c0)=0x10000) lseek(r4, 0x20000010000, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000680)) [ 68.609611] syz-executor.2 (2394) used greatest stack depth: 22688 bytes left [ 68.633958] audit: type=1400 audit(1575131645.394:9): avc: denied { create } for pid=2459 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 16:34:06 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='./bus\x00', 0x4000, 0x0) umount2(&(0x7f0000000080)='./bus\x00', 0x0) pread64(r3, &(0x7f0000005000)=""/4096, 0xffffffc7, 0x0) 16:34:06 executing program 0: r0 = socket$inet(0x10, 0x3, 0x1f) sendmsg(r0, &(0x7f0000000180)={0x0, 0x2cd, &(0x7f000000d000), 0x3b8, 0x0, 0xffffffffffffffa5}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) r3 = getegid() ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r4 = getgid() r5 = getegid() setgid(r5) setresgid(r5, r3, r4) setgid(r5) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) recvfrom$packet(r1, &(0x7f00000002c0)=""/4096, 0x1000, 0x40000043, &(0x7f0000000200)={0x11, 0x4, r6, 0x1, 0xd9, 0x6, @remote}, 0x14) 16:34:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000080)=@fragment, 0x8) close(r1) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = inotify_init() ioctl$int_out(r4, 0x5460, &(0x7f0000000240)) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchdir(r0) r5 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$P9_RREAD(r5, &(0x7f0000000400)={0xb, 0x75, 0x2}, 0xb) clone(0xb102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000200)) tkill(r7, 0x12) ptrace$setsig(0x4203, r7, 0x0, &(0x7f00000000c0)) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r8, &(0x7f0000000a80)=[{&(0x7f0000000600)="80", 0x1}], 0x1) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x20000, 0x0) ioctl$FS_IOC_RESVSP(r9, 0x402c5828, &(0x7f0000000080)={0x0, 0x2, 0x100000000000000a, 0x3}) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x23) ptrace$setopts(0x6, r10, 0x26, 0x4b) write$P9_RFLUSH(r6, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) fsync(r6) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x2, 0x80000001, {0x56, 0x2, 0xfffffffffffffc00, {0xf6}, {0x4, 0x5}, @ramp={0xf4e6, 0x6, {0x3, 0x6, 0x0, 0x9}}}, {0x53, 0x100000001, 0x8006, {0x0, 0x1}, {0x6c8, 0x401}, @ramp={0xf38, 0x3, {0x80, 0x5, 0x0, 0x5}}}}) setxattr$security_ima(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="03e1101b26127d46e3e25f697cd2c30afc68b609733dacabebafa9b499b671bd24b6f86836c219caa539f8d43ff858b0548e4308cd5d960c46d07a595f26ba33e872099a7bfed5ae61ab717c9e1422c5f516f243817b294474de0c673f05239ab59dcac0fb2943ba2f25501a011d247c62290866ec49d739ac230f8b778b935b755b63176e8a8a189b351dccae20316f4f268afda4ddc5019c9ba2f02a64cdcacf9f1d64a1147d55d162cf0cfbc8b9a3eb7096a2adf4181d19303544271ff59d1cf7a2b066294d56514a9b693261b27afd2e75315888b87af9988a74137e00"/237], 0x1, 0x3) 16:34:06 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) write$evdev(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0xffff8000) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x4e23, @empty}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xb9e, &(0x7f00000000c0)='batadv0\x00', 0x3}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6(0xa, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x10001000a00) ioctl$VT_WAITACTIVE(r4, 0x5607) r5 = open(&(0x7f0000000040)='./bus\x00', 0x100, 0x2) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x6100) write$cgroup_type(r6, &(0x7f0000000200)='threaded\x00', 0xf642e7e) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = creat(0x0, 0x0) ppoll(&(0x7f0000000700)=[{}, {0xffffffffffffffff, 0x1141}, {0xffffffffffffffff, 0x3282}, {r7}, {0xffffffffffffffff, 0x360}, {r8, 0x10}], 0x6, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f00000001c0), 0xfffffef3) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(r10, 0x4, 0x8d264d94b88cc547) sendfile64(r9, r10, &(0x7f0000000380), 0x1) setsockopt$inet6_opts(r9, 0x29, 0x37, &(0x7f0000000040)=@fragment={0x87, 0x0, 0x6, 0x9, 0x0, 0x8, 0x65}, 0x8) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TI\xd0C\xcaH\x00') sendmsg$TIPC_NL_MEDIA_SET(r9, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x38043920}, 0xc, &(0x7f00000005c0)={&(0x7f0000000640)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2041090c}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="80070000", @ANYRES16=r11, @ANYBLOB="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"], 0x280}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000080) 16:34:06 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) r1 = dup2(r0, r0) r2 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0xfffffff7) r3 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r4 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) r5 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000058000000000000001800000000000000", @ANYPTR64=&(0x7f0000000000)=ANY=[], @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESDEC=r4]], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0xa8, 0x0, &(0x7f0000000140)=[@free_buffer={0x40086303, r2}, @exit_looper, @register_looper, @request_death={0x400c630e, 0x1}, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000080)={@ptr={0x70742a85, 0x0, &(0x7f0000000040)=""/25, 0x19, 0x2, 0x20}, @fd={0x66642a85, 0x0, r0}, @fda={0x66646185, 0x8, 0x2, 0x38}}, &(0x7f0000000100)={0x0, 0x28, 0x40}}}, @dead_binder_done, @register_looper, @clear_death={0x400c630f, 0x1}, @dead_binder_done, @free_buffer={0x40086303, r4}], 0xb9, 0x0, &(0x7f0000000200)="eeef513ed936da6a664990ffbb506bcd0497e8a61a943dbb573ab567a7cd84fbf7964a62267609998f6a0d6bbda1cf3fc15a198e7b9cbda3ed50760e4ddd0a21c0e862d0b8b5b37349237baf10e8530f41a10ad6784f8163ec17fe0a9b743adc0f4aa12cb965b3301ac131dcfcf6e8233591d10fde9bb9fc4547603c75440603b44e81cdf3f80065719306430293d4a9a2c1c4308d9eefad53dbd2a65efe2fa7eada56a8a840af8aff2e08a4c43cf56a54c80590b63d16c33f"}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000300)={'lapb0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}}) sendmmsg$inet(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000440)={0x2, 0x4e22, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000e40)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@empty]}, @generic={0x83, 0x3, "da"}]}}}], 0x18}}], 0x2, 0x0) 16:34:06 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0xaa, 0x0) fchdir(r0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x1df3361da0516029) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) r4 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) r5 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000380)={0xb, 0x77, 0x1, 0x1}, 0xb) write$P9_RFLUSH(r4, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESDEC=r5]], 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000400)) fsync(r4) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x80000) clock_getres(0x7, &(0x7f0000000200)) ptrace$setregs(0xf, 0x0, 0x7fffffff, &(0x7f0000000500)="eb1ef0739b6749522c35d67a594026aea593f01da7eef2830ab5e68c76eb0b7830eb49e3af268ef114f779d8c4d0692ab3ffea4280cc907e389266e55e41864e5b35f7b954371f3546ee188417adcda30a498a58618069c1290e8a44747dc728dd1751878638080e98eee7fde832c668997e306fddac6a110b0742c21e2de3f7ca60fd81f64241804eecb1db42ac7ca5e72786f5973b9fa6b427d8a1a6ee4e09c7963f2abd866210c3426bf37e0070ece4c985997e8f17764f2b244687dcccd92f1e4c72d65bda228f57aa598a30446da7e347f9212f68c092801fe17cafe57042") getpgid(0xffffffffffffffff) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc(&(0x7f00000009c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000940)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10020200}, 0xc, &(0x7f0000000900)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x1) write$FUSE_NOTIFY_POLL(r5, &(0x7f0000000300)={0x18, 0x1, 0x0, {0x400}}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) sendmsg$nl_netfilter(r6, &(0x7f0000d65000)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000ec0)=ANY=[]}}, 0x4000) 16:34:06 executing program 1: getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000003c0)="eb900d9d4f80d0643e6a119761b02e7ab6bda3cc8e7117e4ccfa1740afe8fdaf7bdbfe73a0f701cc68ec49ff7cd27f8dc8dd0191f2b648de5959bda88ffeaac63ca761efd0456672b104a3a6aeffc058209ee972dcd08a9d9b21b12df9084f1feb17ded04e925fc79a6e8c6876ceca0a6dccd36bbe6eb297fd618a6d78d3e823c32abaa000205d442703d3b0d28e1b2d7122c220dc5e8140cb29f99e4c798b4eee736389207ed2156854ac88a184dc67f0764d0ac8ddc4f1680656dac5733a0c69f81d5bb728d54cfd3be5c517a0cd74b6a4db80ecbac3f6b9f60a63e5620936cd2c7f84", 0x23b60739) write$evdev(r1, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x825e, 0x4) clock_gettime(0x0, &(0x7f0000009c80)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000009b40)=[{{&(0x7f0000000540)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000002a80)=[{&(0x7f00000006c0)=""/69, 0x45}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/103, 0x67}, {&(0x7f00000017c0)=""/252, 0xfc}, {&(0x7f00000018c0)=""/43, 0x2b}, {&(0x7f0000001900)=""/195, 0xc3}, {&(0x7f0000001a00)=""/6, 0x6}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/24, 0x18}], 0x9, &(0x7f0000002b00)=""/39, 0x27}, 0x1}, {{&(0x7f0000002b40)=@x25={0x9, @remote}, 0x80, &(0x7f0000007140)=[{&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/4096, 0x1000}, {&(0x7f0000004bc0)=""/196, 0xc4}, {&(0x7f0000004cc0)=""/4096, 0x1000}, {&(0x7f0000005cc0)=""/151, 0x97}, {&(0x7f0000005d80)=""/175, 0xaf}, {&(0x7f0000005e40)=""/252, 0xfc}, {&(0x7f0000005f40)=""/236, 0xec}, {&(0x7f0000006040)=""/208, 0xd0}, {&(0x7f0000006140)=""/4096, 0x1000}], 0xa, &(0x7f00000071c0)=""/99, 0x63}, 0xfffffffc}, {{&(0x7f0000007240)=@xdp, 0x80, &(0x7f0000007640)=[{&(0x7f00000072c0)=""/211, 0xd3}, {&(0x7f00000073c0)=""/160, 0xa0}, {&(0x7f0000000200)=""/171, 0xab}, {&(0x7f0000007540)=""/89, 0x59}, {&(0x7f00000075c0)=""/25, 0x19}, {&(0x7f0000007600)=""/30, 0x1e}], 0x6, &(0x7f0000007680)=""/151, 0x97}, 0x6}, {{&(0x7f0000007740)=@nfc_llcp, 0x80, &(0x7f0000007940)=[{&(0x7f00000077c0)=""/109, 0x6d}, {&(0x7f0000007840)=""/176, 0xb0}, {&(0x7f0000007900)=""/29, 0x1d}], 0x3, &(0x7f0000007980)=""/237, 0xed}, 0x200}, {{&(0x7f0000007a80)=@x25, 0x80, &(0x7f0000007d40)=[{&(0x7f0000007b00)=""/108, 0x6c}, {&(0x7f0000007b80)=""/151, 0x97}, {&(0x7f0000007c40)=""/188, 0xbc}, {&(0x7f0000007d00)=""/37, 0x25}], 0x4, &(0x7f0000007d80)=""/43, 0x2b}, 0x5}, {{&(0x7f0000007dc0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000008040)=[{&(0x7f0000007e40)=""/185, 0xb9}, {&(0x7f0000007f00)=""/131, 0x83}, {&(0x7f0000007fc0)=""/102, 0x66}], 0x3}, 0x7}, {{&(0x7f0000008080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000008240)=[{&(0x7f0000008100)=""/152, 0x98}, {&(0x7f00000081c0)=""/75, 0x4b}], 0x2, &(0x7f0000008280)=""/148, 0x94}, 0x1a8}, {{&(0x7f0000008340)=@isdn, 0x80, &(0x7f0000008540)=[{&(0x7f00000083c0)=""/31, 0x1f}, {&(0x7f0000008400)=""/9, 0x9}, {&(0x7f0000008440)=""/43, 0x2b}, {&(0x7f0000008480)=""/173, 0xad}], 0x4, &(0x7f0000008580)=""/13, 0xd}, 0x9}, {{&(0x7f00000085c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000008740)=[{&(0x7f0000008640)=""/216, 0xd8}, {0xfffffffffffffffe}], 0x2}, 0x9}, {{&(0x7f0000008780)=@isdn, 0x80, &(0x7f0000009a80)=[{&(0x7f0000008800)=""/4096, 0x1000}, {&(0x7f0000009800)=""/108, 0x6c}, {&(0x7f0000009880)=""/115, 0x73}, {&(0x7f0000009900)=""/231, 0xe7}, {&(0x7f0000009a00)=""/100, 0x64}], 0x5, &(0x7f0000009ac0)=""/105, 0x69}}], 0xa, 0x2, &(0x7f0000009cc0)={r2, r3+10000000}) read(r0, &(0x7f0000009d00)=""/234, 0x26f4e40f5984a187) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x80, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x4, 0x0) ioctl$TCSETAW(r4, 0x5408, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000380)) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r6 = memfd_create(&(0x7f0000000040)='/dev/loop#\x00', 0x0) r7 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockname$inet(r7, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10) sendfile(r6, r5, 0x0, 0x2000005) r8 = creat(&(0x7f00000001c0)='./file0/file0\x00', 0x100) write$P9_RLERRORu(r8, &(0x7f00000004c0)={0x14, 0x7, 0x1, {{0x7, 'trusted'}, 0x8}}, 0x14) read(r6, &(0x7f00000005c0)=""/193, 0xc1) dup2(r6, r0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/user\x00', 0x2, 0x0) fadvise64(0xffffffffffffffff, 0x100000000, 0x9, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:34:06 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x0, 0xb2a}, 0x14) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000380), &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchdir(r1) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_aout(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="0801000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000229b99477910e9ee2e7a388bbe9af454f806136a33381c3ff0802a27e1c4b0995255f76ac9e873"], 0x239) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) sendfile(r5, r6, 0x0, 0x5a92) write$input_event(r4, &(0x7f0000000000)={{}, 0x16, 0x4}, 0x10) sendfile(r6, r6, &(0x7f00000000c0), 0xbf99) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r8 = getpgid(0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000480)={0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000500)={&(0x7f0000000280)=@kern={0x10, 0x0, 0x0, 0x840000}, 0xc, &(0x7f0000000440)=[{&(0x7f0000000380)={0x24, 0x32, 0x8, 0x70bd28, 0x25dfdbff, "", [@typed={0x14, 0x72, @ipv6=@mcast2}]}, 0x24}, {&(0x7f00000008c0)={0x4ac, 0x3e, 0x204, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x100, 0x25, [@typed={0xc, 0x52, @u64=0x9a7c}, @generic="85aeaae1b869616dd980f1cb044f567f66ab9f550105c8abb95304163d43df52ca9754371a065f60f4bd3c157d7b7a54c541853aac629d26ff650ec0120f40ead7bf87f3f29e67c49b1adf5fd052b8fbdf4def1e60e24b748f7475fd791ee4f89f12cd364290764b9f98575f67077b4279896e122292264633301e227d8778d62cfda01d49f82c625b19a0d82e51ed862f8d3dcc0885fc7e637942dcf5eaa0988c71883c503ed9c62dac71607f97a6ca960efbd949c24ef77cfa9e8f2a10038c1b6020b3da8d155ee0ab4a670bd29bf26f3cdde764eca2a617274e228479167231c88f3fcf7e3672e6ec6c89a5aa95"]}, @typed={0x4, 0x6d}, @nested={0x38c, 0x85, [@typed={0x14, 0xa, @ipv6=@rand_addr="a54ad54161706d1715da05d47767965b"}, @generic="98abd13e042b827f2fc2ba9e989655ed1ca099f1e01e97e756957b7eb531f5a52715e564b272c84a5b4650f783e6a33855cc30289ce98075164e18921965bdb481cdc8ee", @generic="fad3edfc6a84f82cdee1c76f08a4da45b62b7f745685e89e1662d62c410c9a15203ba897d578337be735fb5448a99baa96d0e860f78ef49e46fd4302706be242ebbbbff5a809ce6b2e64886da84a0ab665057c3314ec8808e48af70fdb5e847b4aa46f331e69781beb788bd1d1a9048a1a10cd65943b5bb3cf089f1b29bc814c584a8b651fdcacfaa4b77e66f40accce480ae052d552c19789556a69206db5ebc38c05a6dc031dc3992863e2b82f18de73a42c62250914e716ea3010c8b1c1fd1ce42edc15a5b1e2b5c54a7e09af97781de8669750df358405e76a79bf5431fa8e64635a00b6ca37a1497754867c6a9ec1b59ce3cbc273", @typed={0xc, 0x22, @str='ppp1\x00'}, @generic="6953d6ceceb7a50b4bfeea2b404ad7c3c33319e1766804ce03f241fdf0d0d9aedf9c9c828fde33997b2ffcbba716620b3b6f28eef3af6e37c5762fb8b2b089d4eb351ba4e5bcdf72b661b938148c026d7efc9bcbfe1f96aa4ebc64e33a902e0192529d1aa102a4b7ac68c6edbb9640a4198b96d4cafd0b60a3bbe9fcb682c18a400dd5a7a1263ae5c59b278150bf74396c2cf3cfa5cdd0f97aba6b60ea7b1c57a6852eb32c6f6431e6621c30b6df903823badb3e6fce8df989be0c3834c1fc8423f3d295fc6a58d9246b07", @typed={0x8, 0xe, @u32=0x7e17}, @generic="25a00a19d02fe30db306b80325ba603176da070cf9d30fd7a7e6ccdf48a5d1700d49adb353a49cae64109878cd77ae2ae7de63152514d3f93a253a0db989c4d69fc5df64cc0ac29400ec25986dc0b321c67fd6f581013402a77df5c27ff33f8dba9b61089f518bdc2fe34d148ec1d2176e3e55b9fe0a9f37b3d945a45e23bd0db8e14f456ca46fd8644cd6ce31ba68232e4464687fde273b17c5f355ff9c65ef1228da15e0de7e65a8a2308b1be18bab200888840f4612846926a08591cf8b1e2ba39ef59a9c19b08335fff7ed7f4c728401e29e940a12b0ebaed655963a9a2ffb7bb0af8b", @generic="58a8095723a0738f74cc8dc20ffc527db6b123b0d026900226bc9a29aaf924c90d6a8945db475e047daff67483f09d98f97792beaa01be7df410026aefb20227b51b8bf9416eaee5582333dec41c565dac81f4c654e21d600d9da4ae932ec46b72570da1a50968f95ba4ac4add8b5ef38f8e5088"]}, @typed={0xc, 0x2a, @u64}]}, 0x4ac}, {&(0x7f0000000d80)={0x2c8, 0x1e, 0x100, 0x70bd28, 0x25dfdbfb, "", [@nested={0x2b8, 0x95, [@typed={0xc, 0x44, @u64=0x40000000000000}, @generic="00ea0fbd5ad593f4ef10a6b2c8fb4d970203d38dec9d6d186043ce92157f0c3da429f402f1f620875abda55c8d8ba99f39c099bbaf5ad2f163da280f7a7416537fb8360cb66897169c4252d0dbd41407478355aaf3d5fb63f354da22351ab5d9626ab1228d627c4d4b3220e6053b92e98ef950c6f5c38824f4a5c6c27b5c24342428af6001cadfd9aeee61e14eb618cbdea95e8090203fda9731762fab697c170673c087af37d0ecfc7aaa0e3544b8e1a9c88f6ee7e9d7e07faee8ef8e9a65bd7d7ac19912fa4892764353a0ec576074c12159df25856d477b3676bbc2fba6c0d1", @generic="3fa538a817a61621914a46edb7405bc5fc6a7d0c91b893750d59b0e0e072e9760c60cd01add87f4251c1a80462021f1164d8cb5573e24f336d635c5537548eb0bcd0eb81a62116e60153d5c53baec82bb6cb3cc4e57e7ab2146edbef0bdd2f7220fc31a0221e424c3ebfd87fd35edf72247b5bec1639a842e204ae29e72502bb529505877fd5df86433da23ae8a87c358cb30301de1bbd3e11a8da87832b12004a2ac27f1274f239467c3ec2c82e3a604bb0a13570e88890dcca67c7568b90d3d8392a96fe38a405a477f63f2702c53d3e615a81bd230aad35f1dee28ca2ed587c52721dbcc6", @typed={0x8, 0x1a, @pid=r8}, @generic="40106689eae55c13e62f8484ed938792c09afffdfac3772e2feef580e605c63753781eb29b218dd0b106fabe6cd1dd069ab155f41b4efc9bb989f64e6b7fbeb1cc0c5cfbbd97012c79e1f4e26f2e2350ec1a1ae99dcb82c8d9e5004d08700d6eb5a46b9384eb0f8391834316edeaa31a883b496c43a9851e4ca0d96ae21c3a47b76f4afdbceb703d309cb12cbbb3ef59c0ad66cb4d", @typed={0x8, 0x4c, @u32=0x1}, @typed={0x14, 0x3d, @ipv6=@remote}, @generic="1c255a3a836cad5dd0be7aff3bf0c8e2c73d78c3b96464f1d1ae4bac", @typed={0xc, 0x7e, @u64=0x6}]}]}, 0x2c8}], 0x3, &(0x7f00000004c0)=[@cred={{0x18, 0x1, 0x2, {r9, r2, r3}}}], 0x18, 0x800}, 0x4000000) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r7, 0x300, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x1f, @media='udp\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x20000084) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff02}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 69.538797] binder: 2477:2484 transaction failed 29189/-22, size 88-24 line 3014 [ 69.552283] binder: undelivered TRANSACTION_ERROR: 29189 16:34:06 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff}) read(r1, &(0x7f0000000200)=""/250, 0x50c7e5e2) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x38) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}}}, 0x90) 16:34:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x4000000000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) r2 = dup2(r0, 0xffffffffffffffff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[]}}, 0x0) fchdir(r3) r6 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) r7 = socket$inet(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000120007031dfffd946f610500070000001f00000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) r8 = creat(&(0x7f0000000740)='./bus\x00', 0x10) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@local, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000580)=0xe8) iopl(0x6) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @empty}, &(0x7f00000005c0)=0xc) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r8, &(0x7f0000000180)={0x19d}, 0x1a6db1e6) r10 = getegid() ioctl$TUNSETGROUP(r6, 0x400454ce, r10) fsync(r8) write$P9_RSTATu(r8, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r9], 0x17) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406055c9, &(0x7f0000000500)={0x3, 0x80000001, {0x58, 0x2, 0xfffffffffffffc00, {0x0, 0x2a}, {0x4, 0x5}, @period={0x58, 0x0, 0x3f, 0x9, 0x7ff, {0x94bc, 0x2, 0x5, 0x1f}, 0x1, &(0x7f0000000480)=[0x6]}}, {0x53, 0x100000001, 0x6, {0x8}, {0x6c8, 0x401}, @ramp={0xf38, 0x3, {0x0, 0x0, 0x0, 0x8}}}}) sendmsg$TIPC_NL_MON_SET(r6, &(0x7f0000000400)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0x8, 0x0, 0x1, 0x0, 0x0, 0x4000002000000d}, 0x50) socket$key(0xf, 0x3, 0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clock_getres(0xe, &(0x7f00000006c0)) ioctl$int_in(r5, 0x0, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x1) 16:34:07 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffffffffffee3) ioctl$TIOCCBRK(r0, 0x5428) socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x4000, 0x145) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000440)='\x00\x81\x00\x00\x00\x00', 0x0) pwritev(r4, &(0x7f0000000140)=[{&(0x7f0000000180)="16", 0x1}], 0x1, 0x401081806) r5 = open(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r5, 0x4c01) r6 = open(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x2000005) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) sendmsg$IPVS_CMD_NEW_DAEMON(r7, 0x0, 0x8001) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)={0x1c, r8, 0x1, 0x0, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x400a044}, 0x8000) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw6\x00') ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000380)={@dev={0xfe, 0x80, [], 0x2a}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x14}, 0x0, 0x7f, 0x9, 0x400, 0x1}) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x6, 0x2, 0x3}) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x0, 0x0, "f8ca781d5f7e93117b52fa936f014929d175a4e80426585243b392f26e839018d8343d49d4273cc82ed2a2ef63524fc21d71047600", "92ef27daf4634f9065ecbc04c983083f390c3d7bf9ac5c11d0b60f5d070e9826557914da1567ee4534b1192353f3f801223d563be035c7fb302fe546973e9c78", "f1a55947f83b5a8a1bd0d7e25a30c2c9d78038891de2ae1c3c5b7be4da2a17da", [0x0, 0x20]}) flock(0xffffffffffffffff, 0x1) ioprio_set$uid(0x3, 0x0, 0x0) dup(0xffffffffffffffff) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xd4b9e1e) 16:34:07 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4004700e, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000001140)='\'', 0x1}], 0x1, 0x1081804) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x6000000, 0x100000001, 0x6000000, 0x1, 0x9d}, 0x1c) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000000), 0x4) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x3) open(0x0, 0x0, 0x56) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) sendfile(r0, r0, 0x0, 0x200000d) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) r4 = syz_open_pts(r3, 0x0) ioctl$TCFLSH(r4, 0x540b, 0x2) fsetxattr$trusted_overlay_nlink(r4, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x8}, 0x28, 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 16:34:07 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x34) r5 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) r6 = creat(&(0x7f0000000300)='./file1\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280)={0x99}, 0x9e79) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000000c0)={0x0, r6, 0x0, 0x3, 0x8}) 16:34:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) getsockname(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$RNDADDTOENTCNT(r5, 0x40045201, &(0x7f0000000240)=0x6) mmap(&(0x7f0000007000/0x400000)=nil, 0x400000, 0x100000a, 0x11, r5, 0x1d) read(r3, &(0x7f0000000000)=""/250, 0xedf1d44) r6 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000280)) fcntl$setstatus(r6, 0x4, 0x40400) ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000100)) write$FUSE_WRITE(r6, &(0x7f0000000080)={0x18}, 0x18) unlink(&(0x7f0000000280)='./bus\x00') fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 16:34:07 executing program 3: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000000c0)) prctl$PR_SVE_GET_VL(0x33, 0x1f495) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = gettid() recvmmsg(r1, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f0000003b00), 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x400000000000116, 0x0, &(0x7f0000000040)={0x77359400}) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x4e20, 0x7fffffff, @mcast1, 0x1}, 0x1c) write$P9_RRENAMEAT(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup3(r0, r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) r4 = syz_open_pts(r3, 0x0) ioctl$TCFLSH(r4, 0x540b, 0x2) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000000)=""/18) tkill(r2, 0x1004000000013) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000800)="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", 0x10e) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r5, r6, 0x0, 0x80000001) write$FUSE_POLL(r6, &(0x7f0000000140)={0x18, 0x0, 0x6, {0xfffffff7}}, 0x18) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000080)=0x9) r8 = syz_open_pts(r7, 0x0) ioctl$TCFLSH(r8, 0x540b, 0x2) fcntl$setlease(r8, 0x400, 0x0) 16:34:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4080) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x10) socket$netlink(0x10, 0x3, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSERGETLSR(r5, 0x5459, &(0x7f0000000180)) dup2(r2, r1) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r6, 0x0, 0x2) write$P9_RREMOVE(r6, &(0x7f0000000200)={0x7, 0x7b, 0xf8d9}, 0x7) sendmsg$netlink(r6, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f0000000040)) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) 16:34:07 executing program 2: syz_genetlink_get_family_id$tipc2(0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)=""/164, 0xa4) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000a1aff7)={@remote}, 0x14) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x8004) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e5e2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/netlink\x00') preadv(0xffffffffffffffff, &(0x7f0000000780), 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x4) setresuid(0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, 0x0) 16:34:07 executing program 5: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x3f) r0 = socket(0x10, 0x3, 0x0) flock(r0, 0x1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000040)=""/110, &(0x7f00000000c0)=0x6e) write(r0, &(0x7f0000000300)="240000001a005f0014f90800000004000a00000000000000000e00800800090001000000", 0x1f1) 16:34:07 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(&(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xd4bd3388) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x4, 0x9]}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r6 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="68000000d39d6a7c1c2d928877a0320893d63e938b19c09d9591c5615c301babb428540421e2f933cb7f6a423cbe29eac6637482aefdea0e8e69414aee9dd5e07cc7111a1d1069c37deac3c09079b4477b94be38d68456a5d69bb973dcba3f2c6b4e6f611b74ac0d6739a5b773b88f0fc69b6cc2f1d47559de16201e49ff00000000000000749449799b58c39be852afa03b3e42742ed8f7b81075e4ba41602861935cc6a53602778aef997bd61183b30323194d1ab393bb54f7dbcf2464766f5c702114d841c2206cbeab942e113689e0c64c7747b10c02ed26d976feb0334e92ce177f344e9cd7ce89d9fa60332d638cddd3877a3161cd97b33b5c7bd052af57709600"/271, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) ftruncate(r7, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000100)={0x0, r6}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x3}) [ 71.130495] [ 71.132167] ====================================================== [ 71.138499] [ INFO: possible circular locking dependency detected ] [ 71.145510] 4.4.174+ #17 Not tainted [ 71.149214] ------------------------------------------------------- [ 71.155610] syz-executor.1/2603 is trying to acquire lock: [ 71.161235] (sel_mutex){+.+.+.}, at: [] sel_read_policy+0x59/0x110 [ 71.169758] [ 71.169758] but task is already holding lock: [ 71.175725] (sb_writers#4){.+.+.+}, at: [] do_sendfile+0x8a6/0xba0 [ 71.184375] [ 71.184375] which lock already depends on the new lock. [ 71.184375] [ 71.192693] [ 71.192693] the existing dependency chain (in reverse order) is: [ 71.200543] -> #4 (sb_writers#4){.+.+.+}: [ 71.205534] [] lock_acquire+0x15e/0x450 [ 71.211808] [] __sb_start_write+0x1af/0x310 [ 71.218422] [] ext4_lazyinit_thread+0x1e4/0x7b0 [ 71.225382] [] kthread+0x273/0x310 [ 71.231219] [] ret_from_fork+0x55/0x80 [ 71.237401] -> #3 (&eli->li_list_mtx){+.+...}: [ 71.242689] [] lock_acquire+0x15e/0x450 [ 71.248963] [] mutex_lock_nested+0xc1/0xb80 [ 71.255583] [] ext4_register_li_request+0x2fd/0x7d0 [ 71.262889] [] ext4_remount+0x1366/0x1b90 [ 71.269442] [] do_remount_sb2+0x41b/0x7a0 [ 71.275896] [] do_mount+0xfdb/0x2a40 [ 71.281906] [] SyS_mount+0x130/0x1d0 [ 71.287913] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 71.295131] -> #2 (&ext4_li_mtx){+.+.+.}: [ 71.300001] [] lock_acquire+0x15e/0x450 [ 71.306269] [] mutex_lock_nested+0xc1/0xb80 [ 71.312919] [] ext4_register_li_request+0x89/0x7d0 [ 71.320154] [] ext4_remount+0x1366/0x1b90 [ 71.326606] [] do_remount_sb2+0x41b/0x7a0 [ 71.333131] [] do_mount+0xfdb/0x2a40 [ 71.339135] [] SyS_mount+0x130/0x1d0 [ 71.345160] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 71.352398] -> #1 (&type->s_umount_key#34){++++++}: [ 71.358269] [] lock_acquire+0x15e/0x450 [ 71.364534] [] down_read+0x42/0x60 [ 71.370378] [] iterate_supers+0xe1/0x250 [ 71.376731] [] selinux_complete_init+0x2f/0x31 [ 71.383608] [] security_load_policy+0x69d/0x9c0 [ 71.390572] [] sel_write_load+0x175/0xf90 [ 71.397008] [] __vfs_write+0x116/0x3d0 [ 71.403190] [] vfs_write+0x182/0x4e0 [ 71.409194] [] SyS_write+0xdc/0x1c0 [ 71.415117] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 71.422337] -> #0 (sel_mutex){+.+.+.}: [ 71.426912] [] __lock_acquire+0x37d6/0x4f50 [ 71.433536] [] lock_acquire+0x15e/0x450 [ 71.439797] [] mutex_lock_nested+0xc1/0xb80 [ 71.446419] [] sel_read_policy+0x59/0x110 [ 71.452857] [] do_loop_readv_writev+0x148/0x1e0 [ 71.459826] [] do_readv_writev+0x573/0x6e0 [ 71.466361] [] vfs_readv+0x7a/0xb0 [ 71.472192] [] default_file_splice_read+0x3ac/0x8b0 [ 71.479509] [] do_splice_to+0xff/0x160 [ 71.485685] [] splice_direct_to_actor+0x249/0x850 [ 71.492818] [] do_splice_direct+0x1a5/0x260 [ 71.499432] [] do_sendfile+0x4ed/0xba0 [ 71.505607] [] compat_SyS_sendfile+0x144/0x160 [ 71.512495] [] do_fast_syscall_32+0x32d/0xa90 [ 71.519299] [] sysenter_flags_fixed+0xd/0x1a [ 71.526002] [ 71.526002] other info that might help us debug this: [ 71.526002] [ 71.534133] Chain exists of: sel_mutex --> &eli->li_list_mtx --> sb_writers#4 [ 71.542744] Possible unsafe locking scenario: [ 71.542744] [ 71.548802] CPU0 CPU1 [ 71.553453] ---- ---- [ 71.558100] lock(sb_writers#4); [ 71.561934] lock(&eli->li_list_mtx); [ 71.568595] lock(sb_writers#4); [ 71.574938] lock(sel_mutex); [ 71.578372] [ 71.578372] *** DEADLOCK *** [ 71.578372] [ 71.585462] 1 lock held by syz-executor.1/2603: [ 71.590110] #0: (sb_writers#4){.+.+.+}, at: [] do_sendfile+0x8a6/0xba0 [ 71.599310] [ 71.599310] stack backtrace: [ 71.603796] CPU: 0 PID: 2603 Comm: syz-executor.1 Not tainted 4.4.174+ #17 [ 71.610792] 0000000000000000 5af999316c152c37 ffff8801d7357020 ffffffff81aad1a1 [ 71.618853] ffffffff84057a80 ffff8800baf42f80 ffffffff83ab86c0 ffffffff83abc020 [ 71.626904] ffffffff83ac7ed0 ffff8801d7357070 ffffffff813abcda ffffffff83e1e780 [ 71.634947] Call Trace: [ 71.637585] [] dump_stack+0xc1/0x120 [ 71.643027] [] print_circular_bug.cold+0x2f7/0x44e [ 71.649606] [] __lock_acquire+0x37d6/0x4f50 [ 71.655587] [] ? kasan_kmalloc.part.0+0xc6/0xf0 [ 71.661906] [] ? kasan_kmalloc.part.0+0x62/0xf0 [ 71.668237] [] ? trace_hardirqs_on+0x10/0x10 [ 71.674302] [] ? mark_held_locks+0xb1/0x100 [ 71.680275] [] ? new_slab+0x2a1/0x380 [ 71.685737] [] ? new_slab+0x234/0x380 [ 71.691185] [] lock_acquire+0x15e/0x450 [ 71.696805] [] ? sel_read_policy+0x59/0x110 [ 71.702769] [] ? sel_read_policy+0x59/0x110 [ 71.708732] [] mutex_lock_nested+0xc1/0xb80 [ 71.714695] [] ? sel_read_policy+0x59/0x110 [ 71.720662] [] ? kasan_unpoison_shadow+0x35/0x50 [ 71.727056] [] ? fsnotify+0x85c/0x10c0 [ 71.732583] [] ? mutex_trylock+0x500/0x500 [ 71.738477] [] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 71.746959] [] ? rw_copy_check_uvector+0x221/0x2b0 [ 71.753531] [] ? __fsnotify_inode_delete+0x30/0x30 [ 71.760104] [] sel_read_policy+0x59/0x110 [ 71.765894] [] ? selinux_file_permission+0x2f5/0x450 [ 71.772638] [] do_loop_readv_writev+0x148/0x1e0 [ 71.778948] [] ? security_file_permission+0x91/0x1e0 [ 71.785689] [] ? sel_fill_super+0x6d0/0x6d0 [ 71.791652] [] ? sel_fill_super+0x6d0/0x6d0 [ 71.797616] [] do_readv_writev+0x573/0x6e0 [ 71.803487] [] ? vfs_write+0x4e0/0x4e0 [ 71.809015] [] ? check_preemption_disabled+0x3c/0x200 [ 71.815867] [] ? check_preemption_disabled+0x3c/0x200 [ 71.822698] [] ? __alloc_pages_direct_compact+0x220/0x220 [ 71.829876] [] vfs_readv+0x7a/0xb0 [ 71.835058] [] default_file_splice_read+0x3ac/0x8b0 [ 71.841715] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 71.848545] [] ? __module_text_address+0x13/0x140 [ 71.855028] [] ? is_module_text_address+0x2c/0x50 [ 71.861518] [] ? page_cache_pipe_buf_release+0x70/0x70 [ 71.868700] [] ? kasan_kmalloc.part.0+0xc6/0xf0 [ 71.875016] [] ? save_stack_trace+0x26/0x50 [ 71.880980] [] ? kasan_kmalloc.part.0+0x62/0xf0 [ 71.887286] [] ? kasan_kmalloc+0xb7/0xd0 [ 71.892989] [] ? __kmalloc+0x141/0x330 [ 71.898663] [] ? alloc_pipe_info+0x339/0x420 [ 71.904710] [] ? splice_direct_to_actor+0x66e/0x850 [ 71.911380] [] ? do_splice_direct+0x1a5/0x260 [ 71.917516] [] ? do_sendfile+0x4ed/0xba0 [ 71.923222] [] ? compat_SyS_sendfile+0x144/0x160 [ 71.929617] [] ? do_fast_syscall_32+0x32d/0xa90 [ 71.935923] [] ? sysenter_flags_fixed+0xd/0x1a [ 71.942232] [] ? __schedule+0x7e3/0x1ee0 [ 71.947931] [] ? fsnotify+0x85c/0x10c0 [ 71.953460] [] ? preempt_schedule_common+0x41/0x70 [ 71.960030] [] ? security_file_permission+0x91/0x1e0 [ 71.966773] [] do_splice_to+0xff/0x160 [ 71.972298] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 71.979127] [] ? generic_file_splice_read+0x1d0/0x1d0 [ 71.985963] [] splice_direct_to_actor+0x249/0x850 [ 71.992459] [] ? generic_pipe_buf_nosteal+0x10/0x10 [ 71.999115] [] ? do_splice_to+0x160/0x160 [ 72.004903] [] ? rw_verify_area+0x103/0x2f0 [ 72.010865] [] do_splice_direct+0x1a5/0x260 [ 72.016830] [] ? splice_direct_to_actor+0x850/0x850 [ 72.023489] [] ? rcu_read_lock_sched_held+0x10b/0x130 [ 72.030319] [] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 72.036886] [] ? __sb_start_write+0x14f/0x310 [ 72.043026] [] do_sendfile+0x4ed/0xba0 [ 72.048547] [] ? __compat_sys_pwritev64+0x170/0x170 [ 72.055194] [] ? compat_SyS_futex+0x1fb/0x2f0 [ 72.061371] [] ? __compat_put_timespec.isra.0+0xce/0x140 [ 72.068508] [] compat_SyS_sendfile+0x144/0x160 [ 72.074722] [] ? SyS_sendfile64+0x150/0x150 16:34:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/74) write(r2, &(0x7f00000001c0), 0xffffffffffffff14) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xf944, 0x2402) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) read(r4, &(0x7f0000001600)=""/253, 0xfffffffffffffec8) r5 = socket$inet6(0xa, 0x2, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x7, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x100000241) read(r2, &(0x7f0000000600)=""/4096, 0x1000) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0xb53, 0x1b, 0x101}, 0xc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfffffffffffffffb) fcntl$getflags(0xffffffffffffffff, 0x40b) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="fc0000001d000700cd4092d80900070000000000000000000000369321000100ff0100000005d0000000000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5526f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f92731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf1587c3b41", 0xfc) getsockopt$inet_buf(r1, 0x0, 0x10003f, 0x0, 0x0) restart_syscall() syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000200)=r7) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) ioctl$TIOCSBRK(r2, 0x5427) pipe(&(0x7f0000000080)) sendto(r2, &(0x7f0000000380)="5d7bf9b5d1e1dcbe02a2ae7e1cccac36cb6ce07b5d6bed857861abf71475c9f24d03f5be985712b2acff", 0x2a, 0x20000000, 0x0, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) [ 72.080676] [] ? do_sys_ftruncate.constprop.0+0x387/0x470 [ 72.087920] [] ? do_fast_syscall_32+0xd6/0xa90 [ 72.094134] [] ? SyS_sendfile64+0x150/0x150 [ 72.100081] [] do_fast_syscall_32+0x32d/0xa90 [ 72.106203] [] sysenter_flags_fixed+0xd/0x1a 16:34:08 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) setsockopt$sock_void(r2, 0x88, 0x0, 0x0, 0x300) r3 = creat(0x0, 0x200000000000) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, 0x0, 0x0) truncate(0x0, 0x0) [ 72.285111] audit: type=1400 audit(1575131649.044:10): avc: denied { ioctl } for pid=2555 comm="syz-executor.0" path="socket:[8646]" dev="sockfs" ino=8646 ioctlcmd=890b scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:34:09 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYRES16=r3, @ANYBLOB="ed529f86dd3ca61fe0a3306183"], 0x2}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) [ 72.336201] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:09 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) unlinkat(r7, &(0x7f0000000240)='./file0\x00', 0x200) [ 72.473766] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:09 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) setsockopt$sock_void(r2, 0x88, 0x0, 0x0, 0x300) r3 = creat(0x0, 0x200000000000) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, 0x0, 0x0) truncate(0x0, 0x0) [ 72.657807] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:09 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) setsockopt$sock_void(r2, 0x88, 0x0, 0x0, 0x300) r3 = creat(0x0, 0x200000000000) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, 0x0, 0x0) truncate(0x0, 0x0) [ 72.884571] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:09 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) setsockopt$sock_void(r2, 0x88, 0x0, 0x0, 0x300) r3 = creat(0x0, 0x200000000000) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, 0x0, 0x0) truncate(0x0, 0x0) [ 73.063269] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:09 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) setsockopt$sock_void(r2, 0x88, 0x0, 0x0, 0x300) r3 = creat(0x0, 0x200000000000) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, 0x0, 0x0) [ 73.229994] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:10 executing program 4: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="a5105cdcf349fa12aad7d7a2080000000080000000009de37764ed542ebf0eefd2b487907a41af6c81b7ab0bd4c171b6c40200fddae390718bcf8ca6ed42c8c697f58b10f2bda69dd95c939d8571846d22cf892613a61a3814d53ef0048f3b93460340089072749b81443a1878b68230564627237611566fc041838b69b2a25610979a97434344f89670f4687b68fa6286911261d8ed4a21cea520f18c8ee1b66b97fcb16374203064fc703c9ffdfe2038f646a947c63c8fe7fffb000935c58d89081821dda031fdead96184c4941fd2e7396fa90dacb4696feb75065fab446115de105cc7bd0dc21137f4d0d3e0c06c860b374cd7700dd594c179b3dc6ece10738e02d96ba75bf5a1aa043bdda10b452ef58f5be8b7536a4496a02ab3d7d8721829bdd187d697b15a55eee2d92b2c980fd2000f5ce2a682a8e97ef9a341c52546cc14ee65fb56c3b40000000000000000000000000000006974ae058d4ad05caea71ceb182cb16095914fb7c80302b239865284c066873166be14c192625523f425edab3a049cd2df46c81d91a9c17d67c808414533f687150e312da1fedc09961be27e7f04a3d34ee4cd"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) unlinkat(r7, &(0x7f0000000240)='./file0\x00', 0x200) 16:34:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/74) write(r2, &(0x7f00000001c0), 0xffffffffffffff14) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xf944, 0x2402) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) read(r4, &(0x7f0000001600)=""/253, 0xfffffffffffffec8) r5 = socket$inet6(0xa, 0x2, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x7, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x100000241) read(r2, &(0x7f0000000600)=""/4096, 0x1000) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0xb53, 0x1b, 0x101}, 0xc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfffffffffffffffb) fcntl$getflags(0xffffffffffffffff, 0x40b) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="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", 0xfc) getsockopt$inet_buf(r1, 0x0, 0x10003f, 0x0, 0x0) restart_syscall() syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000200)=r7) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) ioctl$TIOCSBRK(r2, 0x5427) pipe(&(0x7f0000000080)) sendto(r2, &(0x7f0000000380)="5d7bf9b5d1e1dcbe02a2ae7e1cccac36cb6ce07b5d6bed857861abf71475c9f24d03f5be985712b2acff", 0x2a, 0x20000000, 0x0, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) 16:34:10 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) unlinkat(r7, &(0x7f0000000240)='./file0\x00', 0x200) 16:34:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(&(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xd4bd3388) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x4, 0x9]}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r6 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/271, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) ftruncate(r7, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000100)={0x0, r6}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x3}) 16:34:10 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) setsockopt$sock_void(r2, 0x88, 0x0, 0x0, 0x300) creat(0x0, 0x200000000000) 16:34:10 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYRES16=r3, @ANYBLOB="ed529f86dd3ca61fe0a3306183"], 0x2}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) [ 73.767436] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:10 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) setsockopt$sock_void(r2, 0x88, 0x0, 0x0, 0x300) [ 74.007159] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:10 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) lookup_dcookie(0x0, &(0x7f0000000140)=""/249, 0xf9) [ 74.211440] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') socket$inet6_udp(0xa, 0x2, 0x0) sched_setscheduler(0x0, 0x0, 0x0) [ 74.410786] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') socket$inet6_udp(0xa, 0x2, 0x0) 16:34:11 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) unlinkat(r7, &(0x7f0000000240)='./file0\x00', 0x200) 16:34:11 executing program 4: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="a5105cdcf349fa12aad7d7a2080000000080000000009de37764ed542ebf0eefd2b487907a41af6c81b7ab0bd4c171b6c40200fddae390718bcf8ca6ed42c8c697f58b10f2bda69dd95c939d8571846d22cf892613a61a3814d53ef0048f3b93460340089072749b81443a1878b68230564627237611566fc041838b69b2a25610979a97434344f89670f4687b68fa6286911261d8ed4a21cea520f18c8ee1b66b97fcb16374203064fc703c9ffdfe2038f646a947c63c8fe7fffb000935c58d89081821dda031fdead96184c4941fd2e7396fa90dacb4696feb75065fab446115de105cc7bd0dc21137f4d0d3e0c06c860b374cd7700dd594c179b3dc6ece10738e02d96ba75bf5a1aa043bdda10b452ef58f5be8b7536a4496a02ab3d7d8721829bdd187d697b15a55eee2d92b2c980fd2000f5ce2a682a8e97ef9a341c52546cc14ee65fb56c3b40000000000000000000000000000006974ae058d4ad05caea71ceb182cb16095914fb7c80302b239865284c066873166be14c192625523f425edab3a049cd2df46c81d91a9c17d67c808414533f687150e312da1fedc09961be27e7f04a3d34ee4cd"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) unlinkat(r7, &(0x7f0000000240)='./file0\x00', 0x200) [ 74.572635] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:11 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYRES16=r3, @ANYBLOB="ed529f86dd3ca61fe0a3306183"], 0x2}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) 16:34:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/74) write(r2, &(0x7f00000001c0), 0xffffffffffffff14) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xf944, 0x2402) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) read(r4, &(0x7f0000001600)=""/253, 0xfffffffffffffec8) r5 = socket$inet6(0xa, 0x2, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x7, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x100000241) read(r2, &(0x7f0000000600)=""/4096, 0x1000) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0xb53, 0x1b, 0x101}, 0xc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfffffffffffffffb) fcntl$getflags(0xffffffffffffffff, 0x40b) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="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", 0xfc) getsockopt$inet_buf(r1, 0x0, 0x10003f, 0x0, 0x0) restart_syscall() syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000200)=r7) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) ioctl$TIOCSBRK(r2, 0x5427) pipe(&(0x7f0000000080)) sendto(r2, &(0x7f0000000380)="5d7bf9b5d1e1dcbe02a2ae7e1cccac36cb6ce07b5d6bed857861abf71475c9f24d03f5be985712b2acff", 0x2a, 0x20000000, 0x0, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) 16:34:11 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(&(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xd4bd3388) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x4, 0x9]}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r6 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/271, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) ftruncate(r7, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000100)={0x0, r6}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x3}) 16:34:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') [ 74.736017] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:11 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYRES16=r3, @ANYBLOB="ed529f86dd3ca61fe0a3306183"], 0x2}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) 16:34:12 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) unlinkat(r7, &(0x7f0000000240)='./file0\x00', 0x200) 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 4: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) unlinkat(r7, &(0x7f0000000240)='./file0\x00', 0x200) 16:34:12 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(&(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xd4bd3388) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x4, 0x9]}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r6 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/271, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) ftruncate(r7, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000100)={0x0, r6}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x3}) 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/74) write(r2, &(0x7f00000001c0), 0xffffffffffffff14) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xf944, 0x2402) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) read(r4, &(0x7f0000001600)=""/253, 0xfffffffffffffec8) r5 = socket$inet6(0xa, 0x2, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x7, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x100000241) read(r2, &(0x7f0000000600)=""/4096, 0x1000) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0xb53, 0x1b, 0x101}, 0xc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfffffffffffffffb) fcntl$getflags(0xffffffffffffffff, 0x40b) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="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", 0xfc) getsockopt$inet_buf(r1, 0x0, 0x10003f, 0x0, 0x0) restart_syscall() syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000200)=r7) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) ioctl$TIOCSBRK(r2, 0x5427) pipe(&(0x7f0000000080)) sendto(r2, &(0x7f0000000380)="5d7bf9b5d1e1dcbe02a2ae7e1cccac36cb6ce07b5d6bed857861abf71475c9f24d03f5be985712b2acff", 0x2a, 0x20000000, 0x0, 0x0) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:12 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='\xae\x00\x04\x00\x00\x00S\x00\x00syz1\x00S\x00\x00\x00\x00\x00\x00\x00\x14\x87W\x19\xf3\x0f \x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') [ 76.119372] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:13 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40)='TIPCv2\x00') 16:34:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) 16:34:13 executing program 4: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) creat(&(0x7f0000000100)='./file0\x00', 0x80) [ 76.375125] ¹á6›Íaï~IyMá‡ì: renamed from nr0 16:34:13 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(&(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xd4bd3388) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x4, 0x9]}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r6 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/271, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) ftruncate(r7, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000100)={0x0, r6}) 16:34:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/74) write(r2, &(0x7f00000001c0), 0xffffffffffffff14) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xf944, 0x2402) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) read(r4, &(0x7f0000001600)=""/253, 0xfffffffffffffec8) r5 = socket$inet6(0xa, 0x2, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x7, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x100000241) read(r2, &(0x7f0000000600)=""/4096, 0x1000) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0xb53, 0x1b, 0x101}, 0xc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfffffffffffffffb) fcntl$getflags(0xffffffffffffffff, 0x40b) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="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", 0xfc) getsockopt$inet_buf(r1, 0x0, 0x10003f, 0x0, 0x0) restart_syscall() syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000200)=r7) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) ioctl$TIOCSBRK(r2, 0x5427) pipe(&(0x7f0000000080)) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) 16:34:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) 16:34:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 4: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) 16:34:14 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(&(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xd4bd3388) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x4, 0x9]}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) r6 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r7 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/271, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x4000010}, 0x10) ftruncate(r7, 0x280080) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000100)={0x0, r6}) 16:34:14 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) vmsplice(r6, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fchdir(r5) 16:34:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/74) write(r2, &(0x7f00000001c0), 0xffffffffffffff14) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xf944, 0x2402) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) read(r4, &(0x7f0000001600)=""/253, 0xfffffffffffffec8) r5 = socket$inet6(0xa, 0x2, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x7, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x100000241) read(r2, &(0x7f0000000600)=""/4096, 0x1000) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0xb53, 0x1b, 0x101}, 0xc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfffffffffffffffb) fcntl$getflags(0xffffffffffffffff, 0x40b) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="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", 0xfc) getsockopt$inet_buf(r1, 0x0, 0x10003f, 0x0, 0x0) restart_syscall() syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000200)=r7) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) ioctl$TIOCSBRK(r2, 0x5427) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x0, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:14 executing program 4: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, 0x0, 0x10) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0) lseek(r1, 0x0, 0x6) r4 = getpid() wait4(r4, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000500)={{{@in=@initdev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) vmsplice(r5, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') 16:34:14 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) geteuid() stat(0x0, &(0x7f0000000700)) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast2, @in=@dev}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getgroups(0x6, &(0x7f0000001080)) getegid() getgid() getgid() stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000f40)) socketpair$unix(0x1, 0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x6) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10, 0x0, 0x0, 0x14008212}, 0x80, &(0x7f0000002000)=[{&(0x7f00000001c0)="5500000018007fafb72d1cb2a4a280930206000000a843096c262569250008000c000000000000a3c728f1c46b7b31afdc1338d54400009b04000000000000", 0x3f}], 0x1}, 0x0) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/234, 0xfffffffffffffe31) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000440)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000340)) 16:34:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socketpair(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~IyM\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xecM.\x8dD<\x82\xfc45\xbe\xd4\xde]i@\x9ax\x1c\x86>\x0f\xd8\xa6\xf8h\x92[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\x1a,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xcf\x81i0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4Nc\xe1\x16\n\xf1\xac\xf4]\xb1\xcd\xf4\xbc\xbb\xed\xe7\x95\xdby\x8ca\xdba\xe2?') 16:34:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000580)=""/74) write(r2, &(0x7f00000001c0), 0xffffffffffffff14) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0xf944, 0x2402) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000080)=0x9) syz_open_pts(r4, 0x0) read(r4, &(0x7f0000001600)=""/253, 0xfffffffffffffec8) r5 = socket$inet6(0xa, 0x2, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x7, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x100000241) read(r2, &(0x7f0000000600)=""/4096, 0x1000) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0xb53, 0x1b, 0x101}, 0xc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xfffffffffffffffb) fcntl$getflags(0xffffffffffffffff, 0x40b) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r6 = socket(0x10, 0x802, 0x0) write(r6, &(0x7f0000000000)="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", 0xfc) getsockopt$inet_buf(r1, 0x0, 0x10003f, 0x0, 0x0) restart_syscall() syz_genetlink_get_family_id$ipvs(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000200)=r7) setxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) 16:34:15 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffd) pipe(&(0x7f0000000640)={0xffffffffffffffff}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write(r2, &(0x7f00000001c0), 0xd4bd3388) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000500)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x4, 0x9]}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x1c3842, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(r1) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000